Category : Security

Diagram Description automatically generated with medium confidence
Articles C2 Summer 2021 Security

PCI DSS 4.0 Is Coming. Will You Be Ready?

Steve Tcherchian
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy.  A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new...
Articles C2 Summer 2021 Data Security

Ransomware Data Recovery — Protect and Recover Your Data

Cohesity
A ransomware attack is devastating. Compromised businesses and organizations suffer steep financial losses (an estimated $10.5 trillion annually by 2025) compounded by the loss of customer and partner trust. If a healthcare organization is a victim, it can even...
A white building with a fountain in front of it Description automatically generated with low confidence
Articles C2 Summer 2021 Security

President Biden’s Cybersecurity Order 101: The Essential Guide

Steve Tcherchian
On May 12th, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity”. Its primary goal is to secure our national digital landscape. What we’re seeing is an overdue, full-force reaction to the...
Articles C2 Spring 2021 Mission Critical Security

Meeting Your Security Integration Objectives – CyberArk, ServiceNow, Splunk and more…

Steve Tcherchian
COVID-19 and its security ramifications continue in 2021 and well beyond. All of the threats brought to the fore when we were sent to work from home got added to the already-growing set of risks...
Articles C2 Spring 2021 Cloud Data Security

Take a Data Privacy Road Trip

Tobias Fuertjes
Three years ago, I started as a PreSales consultant covering the topics of Data Analysis and Data Management. These topics were directly connected to the topic of Data Privacy and all the regulations around it,...
Articles C2 Spring 2021 Cloud Data Mission Critical Security

Digital Transformation For Public Sector Agencies Starts With Better Data Management And Strategies

Cohesity
Digital transformation is more than just a buzzword. For many government agencies, it’s a long-overdue necessity that can be broken down into three main improvement areas: better data insights, better delivery models (especially through mobile...
Articles C2 Spring 2021 Data Security

‘New Nacha supplementing data security requirements coming up’

Thomas Gloerfeld
Nacha is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education,...
Articles C2 Spring 2021 Security

Introducing the Hewlett Packard Enterprise Communications Technology Group

Phil Mottram
Today at our special event “Realize the Full Potential of Open RAN & 5G”, we’re telling the story of how we’re helping customers to unlock the true value of 5G, accelerate innovation with Open RAN...
Editors' Picks Security Storage Winter 2020

A Workplace Paradigm Shift: Building Resilience in Our Workforce and Systems with HPE GreenLake

John Sroka
When the coronavirus pandemic forced everyone out of offices, IT teams scrambled to obtain the necessary hardware and additional software licenses necessary to support entirely remote operations. At the same time, they had to match...