Category : Zero Trust Security

Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 Mission Critical XYGATE Zero Trust Security

XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop

Steve Tcherchian
Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are...