To bring strategy back into your security, turn to chess Ramsés GallegoDecember 6, 20210346 views In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight. Read more
Getting Started with Data-centric Security Dan SimmonsDecember 6, 20210313 views With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations. Read more
HPE GreenLake edge-to-cloud platform brings the cloud to you Flynn MaloyDecember 6, 20210333 views After years of working in cloud environments, we’ve come to expect some basics that we collectively refer to as the “cloud experience.” For example, scalable capacity that’s ready when you need it, and the ability to easily click and spin up new instances. In short, we expect a point-and-click experience with the added advantage that somebody else is managing the IT operations, so we can focus on accelerating outcomes—while paying only for what we use.… Read more
Democratization of AI in the Enterprise Frederic Van HarenDecember 6, 20210369 views The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise and hiring resources from a scarce talent pool. Let alone the expensive infrastructure to achieve such a feat. And something that only larger organizations can afford and justify as they are working on solving significant problems. Read more
Getting the most from your data-driven transformation: 10 key principles Hewlett Packard EnterpriseDecember 6, 20210343 views Best practices like determining what makes data valuable and creating company cultures that promote data sharing will enable businesses to embrace data in the modern enterprise. Read more
How to Safeguard Your Data & Applications from Ransomware CohesityDecember 6, 20210341 views It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work in or are aware of organizations that have been hit by ransomware over the last few years and had the unenviable responsibility of scrambling to recover data, applications, workloads, and systems in the aftermath of an attack. Read more
The Year in Review Around the Storage Block Calvin ZitoDecember 6, 20210368 views Wow, what happened to 2021! You’d think all the time spent at home over the last 20 months would mean 2021 would crawl by but that’s not the case. I’m particularly reflective as I write this article because today I’m also celebrating my 38th work anniversary with HPE. The pace of change has accelerated from when I started working at HPE and especially recently. Let’s look at some of the big moments in 2021 Around the Storage Block. Read more
A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison Shannon GillenwaterSeptember 21, 20210304 views $10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it may be, needs to be discussed and dealt with in every boardroom across the country. Read more
Payments Apps and Database Security. It’s Business as Usual. Until it’s Not. Steve TcherchianSeptember 21, 20210273 views CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic - now it’s critical infrastructure and embedded into our everyday habits. Read more
Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape Matt KimballSeptember 21, 20210257 views The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting IT functions for MSPs and their customers around the world. The impacted ranged from a grocery store in Sweden to a school district in Australia, and all points in between. Read more