When implemented properly, keystroke logging is a win for users, system administrators, security teams and auditors. Users may feel like it is an invasion of privacy–it isn’t. System administrators often believe it will negatively impact performance–it won’t. And security teams always ask if the data collected it searchable/usable–it is. Moreover, for many companies, it can
Data is the lifeblood of mission-critical applications, and HPE NonStop customers rely on the powerful capabilities of NonStop SQL to store, analyze and manage that data. NonStop customers need to ensure their SQL databases are well-organized, use efficient queries, and run at peak-performance. To do that, database managers need powerful management tools and highly-privileged access
As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is,
Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure. To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or
Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last
CMSWire, August 2, 2019–Every few months or so some cybersecurity vendor publishes new research on vulnerabilities and exploits. It might be easy to dismiss such reports as being alarmist headlines intended to drive the security business, but you can never be too careful. XYPRO CISSO and CPO Steve Tcherchian lends his expertise to this article,
LinuxInsider, April 30, 2019–Open Source Flaw Management Shows Signs of Improvement: Report Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses the struggle many organizations face when identifying and managing open source risk across their application portfolios. Click here to learn more.
Money, Inc.–How to Address Business Email Compromise or “CEO Fraud” in Your Business Fraudsters are constantly inventing new scams to outsmart the general public online. The cleverest of this deceitful pack are always trying to one-up their competition by developing the wiliest and therefore most successful variations on online fraud. Click here to continue reading.
Disruptor Daily–June 26, 2019 What’s The Future of Cybersecurity? 38 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how machine learning and artificial intelligence might be leveraged to be the future of cybersecurity.
Get Instant Access to Security News & Advice
Sign up with your email address to be alerted whenever XYPRO insights or news are updated.