Tag : Zero Trust Security

Articles C2 Winter 2021 Data Data Security

How to Safeguard Your Data & Applications from Ransomware

Cohesity
It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work...
Articles C2 Winter 2021 Data Solutions Mission Critical

XYPRO – Best of NonStop 2021

Steve Tcherchian
Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According...
Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...