News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Exact matches only
Filter by Categories
XYPRO’s Resilience on Display at VNUG: A Reunion at Ranas Slott

XYPRO’s Resilience on Display at VNUG: A Reunion at Ranas Slott

Ransomware attacks have become increasingly prevalent, causing significant disruptions and financial losses to organizations. XYPRO’s approach to protecting against ransomware revolves around robust cybersecurity practices. By implementing these strategies, organizations can significantly reduce the risk of falling victim to ransomware attacks.
HPE NonStop Technical Bootcamp 2023: A Memorable In-Person Gathering

HPE NonStop Technical Bootcamp 2023: A Memorable In-Person Gathering

XYPRO in the Spotlight with Groundbreaking Presentation In the world of technology, the annual NonStop Technical Bootcamp (TBC) has long been an essential event for HPE NonStop professionals, and this year's edition in September 2023 was no exception. Held at the elegant Hilton Denver City Center Hotel in Denver, Colorado, the 2023 NonStop TBC brought…
Identify, Protect, Detect – A ZERO Trust Approach to Ransomware Protection  –  HPE NonStop TBC 2023

Identify, Protect, Detect – A ZERO Trust Approach to Ransomware Protection  – HPE NonStop TBC 2023

NonStop Technical Boot Camp 2023 (TBC) is back in person September 12-14, 2023 at the Hilton Denver City Center in Denver, Colorado. Click to Register now! XYPRO Chief Product Officer, Steve Tcherchian will present Identify, Protect, Detect - A ZERO Trust Approach to Ransomware Protection  Ransomware encrypts victims’ files and demands payment in exchange for…
10 Reasons for Optimism in Cybersecurity

10 Reasons for Optimism in Cybersecurity

Another data breach, a new virulent variant of ransomware, burnt-out employees, too little money, and too many threats -- the world of cybersecurity can seem grim. While there is no denying the prevalence of these challenges, there is reason to be hopeful. “When I think about optimism in cybersecurity, I really focus on people, process,…
The Ultimate Guide to Protecting Your Business from Cyber Attacks!

The Ultimate Guide to Protecting Your Business from Cyber Attacks!

Failing to comply with PCI DSS standards results in serious consequences for businesses. In this article, we detail the consequences of failing PCI DSS compliance and the steps businesses can take to avoid it.
Identify, Protect, Detect – A ZERO Trust Approach to Ransomware Protection

Identify, Protect, Detect – A ZERO Trust Approach to Ransomware Protection

This May and June, join XYPRO and your HPE NonStop community in Edinburgh, Auckland, Sydney, Toronto, Mexico City & Dallas for informative presentations, demonstrations, and networking.
PCI DSS Version 3.2.1 to 4.0  Summary of Changes for HPE NonStop™ Systems

PCI DSS Version 3.2.1 to 4.0 Summary of Changes for HPE NonStop™ Systems

PCI DSS Compliance and the HPE NonStop™ Systems For a detailed step-by-step guide on the changes between PCI DSS 3.2.1 and PCI DSS 4.0, please see XYPRO’s “PCI DSS Version 3.2.1 to 4.0 Summary of Changes for HPE NonStop™ Servers” guide on www.xypro.com. XYPRO also provides a comprehensive PCI DSS gap assessment to identify and…
Monitoring: A crucial part of a ZERO Trust strategy

Monitoring: A crucial part of a ZERO Trust strategy

ZERO Trust is a straightforward concept - trust nothing, verify everything. Successful implementation can be difficult though, because retrofitting legacy systems may not be an option, and all-in-one ZERO Trust products do not exist. Configuring your network and systems for ZERO Trust to the best of your ability is the beginning,  not the end of…
Chatbots Could Be the Next Big Hacking Tool—Here’s How to Defend Yourself

Chatbots Could Be the Next Big Hacking Tool—Here’s How to Defend Yourself

AI tools could steal your information Chatbots are getting a lot of attention for making inappropriate comments, and now it turns out they might be used to steal your data. Researchers have found a way to make Bing's artificial intelligence (AI) chatbot ask for user information. The new method could be a convenient tool for hackers. There's growing…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation