Category : C2 Fall 2021

Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
C2 Fall 2021 HPE User Community Leader's notes

Editor’s Letter

Stacie Neall
In this issue’s cover feature, “Securing the edge is no longer enough. SPIFFE can protect your infrastructure,” Bloomberg’s Phil Vachon shares his informative take on why reliability and trust are crucial in a world riddled...
Articles C2 Fall 2021 Innovation Leadership remote work

The Flip Side

Gaye Clemson
It’s refreshing to me to occasionally see honest viewpoints expressed on LinkedIn regarding the various stresses people feel in their day-to-day work lives. Regardless of its actual existence pre-COVID, work/life balance is officially over, replaced by a...
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2021 Data Mission Critical Security

Payments Apps and Database Security. It’s Business as Usual. Until it’s Not.

Steve Tcherchian
CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic - now it’s critical infrastructure and embedded into our everyday...
AI-driven infrastructure Articles C2 Fall 2021 Data Storage HPE InfoSight

Rise Above Downtime: 4 Critical Components of AI-Driven Infrastructure Deliver Agility and Uptime

Sandeep Singh
Data-driven companies face a constant battle against downtime, but you can be prepared. Intelligently engineered AI-driven infrastructure lets your IT organization rise above the traditional monitoring tools to deliver the agility and uptime that your...
Agile Development Articles C2 Fall 2021 Data Security Mission Critical

Balancing Agility with Data Security

Thomas Gloerfeld
Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for...
Articles C2 Fall 2021 DevOps Hack Shack HPE DEV

Discovering HPE DEV: One Developer’s Journey

Jay Giang
As a full-stack developer, I’m always looking for ways to more easily build out applications. In my exploration, I came across the HPE Developer web portal (aka, the HPE DEV site). One of the first...
Articles C2 Fall 2021 CyberRes Cybersecurity Legislation

State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act

Stan Wisseman
Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017...