Category : C2 Fall 2021

Articles C2 Fall 2021 Data Data Solutions Security

Payments Apps and Database Security. It’s Business as Usual. Until it’s Not.

Steve Tcherchian
CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic - now it’s critical infrastructure and embedded into our everyday...
AI-driven infrastructure Articles C2 Fall 2021 Data Storage HPE InfoSight

Rise Above Downtime: 4 Critical Components of AI-Driven Infrastructure Deliver Agility and Uptime

Sandeep Singh
Data-driven companies face a constant battle against downtime, but you can be prepared. Intelligently engineered AI-driven infrastructure lets your IT organization rise above the traditional monitoring tools to deliver the agility and uptime that your...
Agile Development Articles C2 Fall 2021 Data Security Data Solutions

Balancing Agility with Data Security

Thomas Gloerfeld
Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for...
Articles C2 Fall 2021 DevOps Hack Shack HPE DEV

Discovering HPE DEV: One Developer’s Journey

Jay Giang
As a full-stack developer, I’m always looking for ways to more easily build out applications. In my exploration, I came across the HPE Developer web portal (aka, the HPE DEV site). One of the first...
Articles C2 Fall 2021 CyberRes Cybersecurity Legislation

State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act

Stan Wisseman
Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 Cloud HPE GreenLake

Positioning your service provider business for the as-a-service spending surge

Cliff Evans
Edge-to-cloud architectures deliver speed, flexibility and freedom while bypassing the inefficiency of over-provisioning and the risks of under-provisioning. With HPE GreenLake edge-to-cloud platform, service providers can achieve increased security while maintaining optimal control....
Articles C2 Fall 2021 CyberRes Ransomware Security

Ransomware Reality and Survival

Joe Leung
Ransomware is making headlines everywhere. From the energy industry (Colonial Pipeline’s ransom payment of $4.4M) to the food industry (JBS Foods’ ransom payment of $11M), mounting data suggests this insidious trend may be getting out...
Articles C2 Fall 2021 Edge-to-Cloud HPE GreenLake

Colocation is great. It’s even better with an as-a-service platform for all your workloads

Malcolm Ferguson
The convergence of colocation with edge-to-cloud, pay-per-use solutions opens a path to a simpler, more flexible kind of IT....
Articles C2 Fall 2021 Data Solutions GDPR HPE NonStop Compliance Security

GDPR 2021 – Compliance and Penalties; 3 Years Later

Steve Tcherchian
The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR...