News & Insights

Generic filters
Exact matches only
AllRisk ManagementSecure Database ManagementEnterprise Identity & Access ManagementNewsWebinarXYPROHuman Resources Management
Why Cloud Containers Are Vulnerable

Why Cloud Containers Are Vulnerable

CMSWire, August 2, 2019--Every few months or so some cybersecurity vendor publishes new research on vulnerabilities and exploits. It might be easy to dismiss such reports as being alarmist headlines intended to drive the security business, but you can never be too careful.  XYPRO CISSO and CPO Steve Tcherchian lends his expertise to this article,…
Open Source Flaw Management Shows Signs of Improvement: Report

Open Source Flaw Management Shows Signs of Improvement: Report

LinuxInsider, April 30, 2019--Open Source Flaw Management Shows Signs of Improvement: Report Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses the struggle many organizations face when identifying and managing open source risk across their application portfolios. Click here to learn more.
How to Address Busines Email Compromise or “CEO Fraud” in Your Business

How to Address Busines Email Compromise or “CEO Fraud” in Your Business

Money, Inc.--How to Address Business Email Compromise or "CEO Fraud" in Your Business Fraudsters are constantly inventing new scams to outsmart the general public online.  The cleverest of this deceitful pack are always trying to one-up their competition by developing the wiliest and therefore most successful variations on online fraud. Click here to continue reading.
What’s The Future of Cybersecurity? 38 Experts Share Their Insights

What’s The Future of Cybersecurity? 38 Experts Share Their Insights

Disruptor Daily--June 26, 2019 What’s The Future of Cybersecurity? 38 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how machine learning and artificial intelligence might be leveraged to be the future of cybersecurity.
What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights

What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights

Disruptor Daily--June 29, 2019 What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses how the future of business is data driven.
What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights

What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights

Disruptor Daily--June 30, 2019 What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how artificial intelligence promises to be the future of cybersecurity.
XYPRO’s XYGATE® User Authentication adds integration for RSA Cloud Authentication Service for HPE NonStop servers

XYPRO’s XYGATE® User Authentication adds integration for RSA Cloud Authentication Service for HPE NonStop servers

XYPRO Technology is a certified RSA Ready Technology partner. XYGATE User Authentication (XUA) now supports the RSA Cloud Authentication Service as a second factor of authentication for HPE NonStop servers. RSA is one of the world’s most widely deployed two-factor authentication solutions. Their certification program assures the solution customers are deploying has been verified interoperable…
Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection

Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection

Big Breaches, Big Data, Big Context - How to Empower the Next Generation of Security Threat Detection It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute's 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach.…
Proactive Security and Threat Detection – it’s not That SIEMple

Proactive Security and Threat Detection – it’s not That SIEMple

Proactive Security and Threat Detection - it’s not That SIEMple Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a controllable incident and a headline grabbing, catastrophic data breach. Most organizations cannot…

Get Instant Access to Security News & Advice


Sign up with your email address to be alerted whenever XYPRO insights or news are updated.