Category : C2 Winter 2021

Articles C2 Winter 2021

Working the Great Resignation: How Employers Can Transform Things to their Advantage

Dana Gardner
The so-called great resignation has anywhere from half to two-thirds of U.S. workers looking for something other than their current situation. Whatever the percentage, there’s no question that workers across the board have and continue...
Articles C2 Winter 2021 Data Data Security

How to Safeguard Your Data & Applications from Ransomware

Cohesity
It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work...
Articles C2 Winter 2021 Data Data Security Data Storage

Getting the most from your data-driven transformation: 10 key principles

Hewlett Packard Enterprise
Best practices like determining what makes data valuable and creating company cultures that promote data sharing will enable businesses to embrace data in the modern enterprise....
AI AI-driven infrastructure Articles Artificial Intelligence C2 Winter 2021 Data Data Security

Democratization of AI in the Enterprise

Frederic Van Haren
The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise...
Articles C2 Winter 2021 Data Solutions Data Solutions

XYPRO – Best of NonStop 2021

Steve Tcherchian
Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According...
Articles C2 Winter 2021 Cloud Data Data Storage Edge-to-Cloud HPE GreenLake

HPE GreenLake edge-to-cloud platform brings the cloud to you

Flynn Maloy
After years of working in cloud environments, we’ve come to expect some basics that we collectively refer to as the “cloud experience.” For example, scalable capacity that’s ready when you need it, and the ability...
Articles C2 Winter 2021 Data Security Security

How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain

Yash Vartak
Now that we are slowly coming out of the COVID-19 Pandemic, work might never return to the “normal” of employees spending the majority of their days in an office building. Remote working, or some hybrid, is...
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Articles C2 Winter 2021 Data Solutions Data Solutions

New Data Integrity Architectures for Mission Critical Systems

Gravic
This article highlights some interesting work from Gravic Labs, Gravic’s Research and Development group, in the area of increasing the data integrity of mission critical systems. The article expands on our talk at The Connect...