News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Filter by Categories

Keystroke Logging. Are you in?

When implemented properly, keystroke logging is a win for users, system administrators, security teams and auditors.  Users may feel like it is an invasion of privacy--it isn’t. System administrators often believe it will negatively impact performance--it won’t.  And security teams always ask if the data collected it searchable/usable--it is. Moreover, for many companies, it can…
Working in Cybersecurity

Working in Cybersecurity

Varonis, Dec 18, 2019--What Working in Cybersecurity is Really Like: A Day in the Life Great career advice provided by Steve Tcherchian, Chief Information Security Officer at XYPRO, a cybersecurity analytics company. Main Takeaways: Find a mentor, then listen and learn. The best leaders will be energized to share their experiences – both positive and…
XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is,…
Top Security Tips for Entrepreneurs

Top Security Tips for Entrepreneurs

Business Unplugged, Oct 22, 2019--Top Security Tips for Entrepreneurs | Business Unplugged | Carol Roth Master Your AI The ability to leverage machine learning and artificial intelligence is critical to entrepreneurs’ cybersecurity efforts. There is no doubt AI can become the future of security. Data is exponentially increasing. Automation and machine learning have catapulted us…
Stop Wasting Money on Security!

Stop Wasting Money on Security!

Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure. To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or…
Strategies for Capturing and Creating Value from your Security Data

Strategies for Capturing and Creating Value from your Security Data

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last…
Why Cloud Containers Are Vulnerable

Why Cloud Containers Are Vulnerable

CMSWire, August 2, 2019--Every few months or so some cybersecurity vendor publishes new research on vulnerabilities and exploits. It might be easy to dismiss such reports as being alarmist headlines intended to drive the security business, but you can never be too careful.  XYPRO CISSO and CPO Steve Tcherchian lends his expertise to this article,…
Open Source Flaw Management Shows Signs of Improvement: Report

Open Source Flaw Management Shows Signs of Improvement: Report

LinuxInsider, April 30, 2019--Open Source Flaw Management Shows Signs of Improvement: Report Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses the struggle many organizations face when identifying and managing open source risk across their application portfolios. Click here to learn more.
How to Address Busines Email Compromise or “CEO Fraud” in Your Business

How to Address Busines Email Compromise or “CEO Fraud” in Your Business

Money, Inc.--How to Address Business Email Compromise or "CEO Fraud" in Your Business Fraudsters are constantly inventing new scams to outsmart the general public online.  The cleverest of this deceitful pack are always trying to one-up their competition by developing the wiliest and therefore most successful variations on online fraud. Click here to continue reading.

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation