Category : Security

Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Articles C2 Fall 2021 Data Mission Critical Security

Payments Apps and Database Security. It’s Business as Usual. Until it’s Not.

Steve Tcherchian
CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic - now it’s critical infrastructure and embedded into our everyday...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 CyberRes Ransomware Security

Ransomware Reality and Survival

Joe Leung
Ransomware is making headlines everywhere. From the energy industry (Colonial Pipeline’s ransom payment of $4.4M) to the food industry (JBS Foods’ ransom payment of $11M), mounting data suggests this insidious trend may be getting out...
Articles C2 Fall 2021 GDPR HPE NonStop Compliance Mission Critical Security

GDPR 2021 – Compliance and Penalties; 3 Years Later

Steve Tcherchian
The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR...
Articles C2 Fall 2021 Security SOAR

Taming the Security Alert Tsunami with Automation

Yash Vartak
Are you running a Security Operations Center (SOC) that handles hundreds or thousands of alerts? Are your analysts unable to cope with a tsunami of events and eventually get burnt out? Are they unable to...
Diagram Description automatically generated with medium confidence
Articles C2 Summer 2021 Security

PCI DSS 4.0 Is Coming. Will You Be Ready?

Steve Tcherchian
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy.  A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new...
Articles C2 Summer 2021 Data Security

Ransomware Data Recovery — Protect and Recover Your Data

Cohesity
A ransomware attack is devastating. Compromised businesses and organizations suffer steep financial losses (an estimated $10.5 trillion annually by 2025) compounded by the loss of customer and partner trust. If a healthcare organization is a victim, it can even...
A white building with a fountain in front of it Description automatically generated with low confidence
Articles C2 Summer 2021 Security

President Biden’s Cybersecurity Order 101: The Essential Guide

Steve Tcherchian
On May 12th, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity”. Its primary goal is to secure our national digital landscape. What we’re seeing is an overdue, full-force reaction to the...