Tag : Security

Articles C2 Spring 2022 Security

Biggest Lie in the World (and Kevin’s Famous Chili Recipe)

Beth Ziesenis
He spilled the whole batch in the lobby, and no one got a bite. But that doesn’t mean his famous recipe is gone forever. A clever TikTok-er revealed that Peacock TV’s terms and conditions includes...
Articles C2 Winter 2021 Data Solutions Data Solutions

New Data Integrity Architectures for Mission Critical Systems

Gravic
This article highlights some interesting work from Gravic Labs, Gravic’s Research and Development group, in the area of increasing the data integrity of mission critical systems. The article expands on our talk at The Connect...
Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2020 Cybersecurity Data FBI

A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison

Shannon Gillenwater
$10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it...
Agile Development Articles C2 Fall 2021 Data Security Data Solutions

Balancing Agility with Data Security

Thomas Gloerfeld
Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for...
Articles C2 Fall 2021 CyberRes Cybersecurity Legislation

State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act

Stan Wisseman
Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017...
Articles C2 Fall 2021 Security SOAR

Taming the Security Alert Tsunami with Automation

Yash Vartak
Are you running a Security Operations Center (SOC) that handles hundreds or thousands of alerts? Are your analysts unable to cope with a tsunami of events and eventually get burnt out? Are they unable to...
Articles C2 Fall 2021 Data Solutions XYGATE Zero Trust Security

XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop

Steve Tcherchian
Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are...
Diagram Description automatically generated with medium confidence
Articles C2 Summer 2021 Security

PCI DSS 4.0 Is Coming. Will You Be Ready?

Steve Tcherchian
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy.  A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new...