Big Breaches, Big Data, Big Context - How to Empower the Next Generation of Security Threat Detection It can take months or even years before a data breach is detected. The...
Search Results
The New Regulatory Terrain for Data Privacy
The New Regulatory Terrain for Data Privacy 2018 saw the introduction of The General Data Protection Regulation, or GDPR. A major piece of legislation designed to address the...
Breaches are from Mars, Security is from Venus
There is quite a large disconnect in the way security breaches are evolving versus how security solutions and resources are keeping up to address them, much like...
Protect Sensitive Data: #3 on XYPRO’s Top 10 List of NonStop Security Fundamentals
Because high-availability and fault-tolerant systems need strong security Over the last several months, we’ve covered some very important concepts in our Top 10 countdown of...
Cyberattack Almost Shuts Down Health System, Shows Need for Security
Relias Media January 1, 2021 - Cyberattack Almost Shuts Down Health System, Shows Need for Security Executive Summary A U.S. healthcare system recently was the victim of a...
XYPRO’s 2021 Cybersecurity Predictions – Passwords are Archaic Introduce a Second Factor Authentication
With 2020 finally in the books, it’s time to look forward and discuss our cybersecurity predictions that will most affect the industry in 2021. I thought long and hard about what...
Confronting Inaction in the CyberSecurity Industry
2020 was another troubling year in the cybersecurity world. We saw a repeat of 2019’s data breaches on a larger scale. Instagram, TikTok, YouTube, Nintendo, WaWa and many more...
Now Is the Time to Replace VPN With Zero Trust
Reworked November 24, 2020 - Now Is the Time to Replace VPN With Zero Trust ... What Is Wrong With VPN? The perimeter methodology that VPN relies on makes it...
Protect Your Remote Workforce with Multi-factor Authentication
All it takes is one compromised account to one legacy...
11 Cybersecurity Threats for 2020 Plus 5 Solutions
I-Sight, April 23, 2020--11 Cybersecurity Threats for 2020 (Plus 5 Solutions) Password Attacks According to the 2018 Varonis Global Data Risk Report, 65 per cent of companies...
11 Cybersecurity Threats for 2020 (Plus 5 Solutions)
i-Sight, April 23, 2020-- 11 Cybersecurity Threats for 2020 (Plus 5 Solutions) According to the 2018 Varonis Global Data Risk Report, 65 [percent] of companies use over 500...
COVID-19: Now is the time for Multi-Factor Authentication
uring this time of unprecedented uncertainty, we at XYPRO are concerned about the safety and health of our employees, their families, our customers and...
Risk Management in the Real World: Today, Tomorrow and Beyond
2018 was another troubling year in the cybersecurity world. We saw a repeat of last year’s data breaches on a larger scale. Google, Toyota, Facebook, Under Armour, LifeLock, Air...
Secure Application Development in a Connected World
Secure Application Development in a Connected World Applications are everywhere. Take a look at your mobile device and you will realize how integral applications are to everyday...
HPE NonStop Boot Camp 2017 – A Bright Future Ahead
HPE NonStop Boot Camp 2017 - A Bright Future Ahead As 2017 wraps up, there were only a few more trade shows left on the schedule and this one is the biggie. This year’s NonStop...
PCI 3.2 – Are YOU Ready?
Originally published in The Connection - PCI 3.2 | Are YOU Ready? As a citizen of the HPE NonStop community, it is sometimes hard to believe how much my work has changed over 25...
PCI-DSS 3.2 – The Art of Compliance on the HPE Integrity NonStop Server
PCI-DSS 3.2 – The Art of Compliance on the HPE Integrity NonStop Server Since the release of PCI-DSS 3.0 in late 2013, the PCI Security Standards council has been quite...
Security Intelligence – Intercepting “Low and Slow”
Originally published in Connect Converge – Fall 2015, pg. 20 Security has been a lifelong passion of mine. Growing up, I constantly pushed the envelope of what was possible. This...