Tag : Cybersecurity

https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2020 Cybersecurity Data FBI

A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison

Shannon Gillenwater
$10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it...
Articles C2 Fall 2021 CyberRes Cybersecurity Legislation

State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act

Stan Wisseman
Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 Cybersecurity HPE Education

Cyber security awareness: How to establish an effective program

John F McDermott
In today’s challenging environment, cyber security awareness programs must deliver much more than just the ability to check a compliance box. Here’s a straightforward model to ensure that your training is really changing behavior. Many...
Articles C2 Summer 2021 Data Security

Ransomware Data Recovery — Protect and Recover Your Data

Cohesity
A ransomware attack is devastating. Compromised businesses and organizations suffer steep financial losses (an estimated $10.5 trillion annually by 2025) compounded by the loss of customer and partner trust. If a healthcare organization is a victim, it can even...
A white building with a fountain in front of it Description automatically generated with low confidence
Articles C2 Summer 2021 Security

President Biden’s Cybersecurity Order 101: The Essential Guide

Steve Tcherchian
On May 12th, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity”. Its primary goal is to secure our national digital landscape. What we’re seeing is an overdue, full-force reaction to the...