XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop Steve TcherchianSeptember 21, 20210252 views Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low cost to execute and high value rate of return. Four percent might seem like a low number, but just one user falling victim to a phishing attempt is one too many.… Read more
Reinvent the way you work with virtualized healthcare Rich BirdSeptember 21, 20210178 views Understand why healthcare trends are pushing IT to optimize data management and support a remote network of caregivers and patients more effectively—and why virtual technologies are the answer. Healthcare is accelerating transformation as escalating industry demands and how services are accessed place a huge strain on existing infrastructure. Organizations are now racing to deliver personalized care to a rising number of patients, while their workforces take on novel infectious diseases and become increasingly mobile and dispersed.… Read more
Cyber security awareness: How to establish an effective program John F McDermottSeptember 21, 20210233 views In today’s challenging environment, cyber security awareness programs must deliver much more than just the ability to check a compliance box. Here’s a straightforward model to ensure that your training is really changing behavior. Many organizations believe that merely providing a series of videos or mandating an annual “must-watch” video will solve the cyber security awareness “problem.” I sincerely beg to differ.… Read more
Taming the Security Alert Tsunami with Automation Yash VartakSeptember 21, 20210391 views Are you running a Security Operations Center (SOC) that handles hundreds or thousands of alerts? Are your analysts unable to cope with a tsunami of events and eventually get burnt out? Are they unable to zero in on events of interest at speed and scale? Read more
GDPR 2021 – Compliance and Penalties; 3 Years Later Steve TcherchianSeptember 21, 20210332 views The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based. Read more
Colocation is great. It’s even better with an as-a-service platform for all your workloads Malcolm FergusonSeptember 21, 20210178 views The convergence of colocation with edge-to-cloud, pay-per-use solutions opens a path to a simpler, more flexible kind of IT. Read more
Ransomware Reality and Survival Joe LeungSeptember 21, 20210458 views Ransomware is making headlines everywhere. From the energy industry (Colonial Pipeline’s ransom payment of $4.4M) to the food industry (JBS Foods’ ransom payment of $11M), mounting data suggests this insidious trend may be getting out of control. Read more
Positioning your service provider business for the as-a-service spending surge Cliff EvansSeptember 21, 20210352 views Edge-to-cloud architectures deliver speed, flexibility and freedom while bypassing the inefficiency of over-provisioning and the risks of under-provisioning. With HPE GreenLake edge-to-cloud platform, service providers can achieve increased security while maintaining optimal control. Read more
Making the move to zero trust architecture: 4 key considerations Jeff EntersSeptember 21, 20210274 views New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion. Fortunately, we’re moving beyond that now.… Read more
State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act Stan WissemanSeptember 21, 20210442 views Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017 to 2020. The report also noted that the 50% increase in attacks is likely a fraction of the true number of incidents because many go unreported. Research by Barracuda Networks indicates that 44% of global ransomware attacks in 2020 targeted municipalities. Read more