IDC whitepaper quantifies the business benefits of HPE Solutions with Cohesity
Get this free white paper, and learn more about HPE Solutions with Cohesity, a one-stop shop for data protection and management.
Get this free white paper, and learn more about HPE Solutions with Cohesity, a one-stop shop for data protection and management.
Expanding on their leadership positions in HPE NonStop Backup Storage Management and Cybersecurity Threat Detection, the latest partnership delivers enhanced levels of HPE NonStop digital resiliency. ETI-NET, the leading provider of HPE NonStop backup systems data and monitoring management, and XYPRO Technology, the leading provider of HPE NonStop Cybersecurity and Compliance…
EXPERT WEBINAR SERIES: CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized approach.
For years, US lawmakers have avoided making tough calls about what data privacy protections we should give consumers and how they should be enforced. That finally may be changing. Last week, the US House Energy and Commerce Committee greenlit a watershed privacy bill that strikes compromises on a series…
Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon to get carried away. In fact, separate research reveals that many organizations still treat security as…
It was an honor to be invited to speak at this year’s Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days.
Recent world events have heightened concerns about data security. Stricter laws and increased risk of cyber attacks have forced businesses to prioritize data protection measures and implement them quickly.
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight.
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations.
The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based.