Security

Introducing the Hewlett Packard Enterprise Communications Technology Group

Today at our special event “Realize the Full Potential of Open RAN & 5G”, we’re telling the story of how we’re helping customers to unlock the true value of 5G, accelerate innovation with Open RAN (radio access network) and ignite new revenue at the telco edge. We will be joined by an impressive collection of industry leaders who will discuss how an open, cloud-native telco network provides the agility to address the digital transformation needs of the next generation of customers.
Read more

A Workplace Paradigm Shift: Building Resilience in Our Workforce and Systems with HPE GreenLake

When the coronavirus pandemic forced everyone out of offices, IT teams scrambled to obtain the necessary hardware and additional software licenses necessary to support entirely remote operations. At the same time, they had to match users’ present and future needs with the appropriate infrastructure. That, combined with many other unknowns, compounded the stress and urgency to keep business running smoothly around the world.…

Read more

Why Backups Have Become Ransomware Targets and How to Prevent Getting Robbed

Cybercrime is on the rise and the current global pandemic has only made it worse. As remote work numbers grew from February to April of this year, so did ransomware attacks. In March 2020, ransomware attacks increased 148% over baseline levels from February 2020, according to one report. Financial services organizations were the most heavily targeted during that time, yet no industry is immune.
Read more

A Resilient Partnership

K2 Insurance Services, is a leading insurance services company, with a specialized portfolio of insurance products. When K2 started to experience significant geographical expansion, it realized that it needed a technology partner that could help the business grow without increasing its exposure to risk. The company wanted a trusted partner to help scale while providing performance, security and reliability.
Read more

“It is a myth that in order to act like a leader you need to act powerful”, with Penny Bauder & Lisa Partridge

It is a myth that you must act powerful to gain respect — many people confuse being “the one who is responsible” with being “in power” and that in order to “act like a leader” you need to “act powerful”. Both men and women do this — decibel level and states of constant dissatisfaction don’t generally keep people on their toes in a good way. It breeds anxiety.
Read more

How Cookies and Rockets Changed My Life – Girl Scouts and STEM

I was named CEO of Girl Scouts of the USA in 2017. It’s truly an honor to lead this organization that made such an impact on my life and on the lives of 50 million alums across the country and the world. In 2018, research showed that less than one percent of Silicon Valley leadership was Latina. So how did I get to be one of those leaders? What in my life prepared me with the courage and confidence to take on leadership roles and thrive?
Read more

Partnering for your success: HPE Mission Critical Solutions strengthens partnerships in 2019

Advancing on the journey started a few years ago, Hewlett Packard Enterprise has continued to transform during 2019. This journey has included both spin-offs and acquisitions; the next-Gen IT project – a significant effort to simplify our IT landscape; a substantial organizational transformation in the field, moving from large regions to focused geographies, and more. But amidst all the changes, there are three elements at the core of the company that have remained intact: our focus on innovation, on customer needs and, last but not least, on partnering.
Read more

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn't been said before - that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 - is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today - credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2 factor authentication.
Read more

5 Tips to Prevent Ransomware Attacks on Backups

Backup and recovery solutions are designed to protect your organization, but sophisticated malware like Locky and Crypto-ransomware are now targeting your backup data. Not surprising, considering the rise in frequency and breadth of ransomware attacks. The first ransomware payment—circa 1989—set the stage for hackers everywhere to begin locking up the data of unsuspecting targets and holding it until owners paid to get it back.
Read more