Data

To bring strategy back into your security, turn to chess

In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight.
Read more

Getting Started with Data-centric Security

With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations.
Read more

HPE GreenLake edge-to-cloud platform brings the cloud to you

After years of working in cloud environments, we’ve come to expect some basics that we collectively refer to as the “cloud experience.” For example, scalable capacity that’s ready when you need it, and the ability to easily click and spin up new instances. In short, we expect a point-and-click experience with the added advantage that somebody else is managing the IT operations, so we can focus on accelerating outcomes—while paying only for what we use.…

Read more

Democratization of AI in the Enterprise

The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise and hiring resources from a scarce talent pool. Let alone the expensive infrastructure to achieve such a feat. And something that only larger organizations can afford and justify as they are working on solving significant problems.
Read more

How to Safeguard Your Data & Applications from Ransomware

It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work in or are aware of organizations that have been hit by ransomware over the last few years and had the unenviable responsibility of scrambling to recover data, applications, workloads, and systems in the aftermath of an attack.
Read more

The Year in Review Around the Storage Block

Wow, what happened to 2021! You’d think all the time spent at home over the last 20 months would mean 2021 would crawl by but that’s not the case. I’m particularly reflective as I write this article because today I’m also celebrating my 38th work anniversary with HPE. The pace of change has accelerated from when I started working at HPE and especially recently. Let’s look at some of the big moments in 2021 Around the Storage Block.
Read more

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting IT functions for MSPs and their customers around the world. The impacted ranged from a grocery store in Sweden to a school district in Australia, and all points in between. 
Read more