The explosion of unstructured data growth has tasked organizations with not only managing and storing application data but also with gaining insights from that data while keeping costs under control. This is no simple task....
Tag : Cybersecurity
XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD
It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days....
Continuous Data Protection: The new imperative
Recent world events have heightened concerns about data security. Stricter laws and increased risk of cyber attacks have forced businesses to prioritize data protection measures and implement them quickly....
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Securing the edge is no longer enough. SPIFFE can protect your infrastructure
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison
$10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it...
State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act
Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017...
Making the move to zero trust architecture: 4 key considerations
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...