News & Insights

Search
Generic filters
Exact matches only
AllEnterprise Identity & Access ManagementXYPRORisk ManagementSecure Database ManagementNews
Keystroke Logging. Are you in?

Keystroke Logging. Are you in?

When implemented properly, keystroke logging is a win for users, system administrators, security teams and auditors.  Users may feel like it is an invasion of privacy–it isn’t. System administrators often believe it will negatively impact performance–it won’t.  And security teams always ask if the data collected it searchable/usable–it is. Moreover, for many companies, it can
A Journey Through Secure SQL Management – Customer Use Cases

A Journey Through Secure SQL Management – Customer Use Cases

Data is the lifeblood of mission-critical applications, and HPE NonStop customers rely on the powerful capabilities of NonStop SQL to store, analyze and manage that data. NonStop customers need to ensure their SQL databases are well-organized, use efficient queries, and run at peak-performance. To do that, database managers need powerful management tools and highly-privileged access
XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is,
Stop Wasting Money on Security!

Stop Wasting Money on Security!

Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure. To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or
Strategies for Capturing and Creating Value from your Security Data

Strategies for Capturing and Creating Value from your Security Data

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last
Why Cloud Containers Are Vulnerable

Why Cloud Containers Are Vulnerable

CMSWire, August 2, 2019–Every few months or so some cybersecurity vendor publishes new research on vulnerabilities and exploits. It might be easy to dismiss such reports as being alarmist headlines intended to drive the security business, but you can never be too careful.  XYPRO CISSO and CPO Steve Tcherchian lends his expertise to this article,
Open Source Flaw Management Shows Signs of Improvement: Report

Open Source Flaw Management Shows Signs of Improvement: Report

LinuxInsider, April 30, 2019–Open Source Flaw Management Shows Signs of Improvement: Report Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses the struggle many organizations face when identifying and managing open source risk across their application portfolios. Click here to learn more.
How to Address Busines Email Compromise or “CEO Fraud” in Your Business

How to Address Busines Email Compromise or “CEO Fraud” in Your Business

Money, Inc.–How to Address Business Email Compromise or “CEO Fraud” in Your Business Fraudsters are constantly inventing new scams to outsmart the general public online.  The cleverest of this deceitful pack are always trying to one-up their competition by developing the wiliest and therefore most successful variations on online fraud. Click here to continue reading.
What’s The Future of Cybersecurity? 38 Experts Share Their Insights

What’s The Future of Cybersecurity? 38 Experts Share Their Insights

Disruptor Daily–June 26, 2019 What’s The Future of Cybersecurity? 38 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how machine learning and artificial intelligence might be leveraged to be the future of cybersecurity.

Get Instant Access to Security News & Advice

Sign up with your email address to be alerted whenever XYPRO insights or news are updated.