News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Filter by Categories
What’s The Future of Cybersecurity? 38 Experts Share Their Insights

What’s The Future of Cybersecurity? 38 Experts Share Their Insights

Disruptor Daily--June 26, 2019 What’s The Future of Cybersecurity? 38 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how machine learning and artificial intelligence might be leveraged to be the future of cybersecurity.
What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights

What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights

Disruptor Daily--June 29, 2019 What Trends Are Shaping Cybersecurity in 2019? 35 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, discusses how the future of business is data driven.
What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights

What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights

Disruptor Daily--June 30, 2019 What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights Steve Tcherchian, CISSO, XYPRO Chief Product Officer, lends his expertise to the discussion of how artificial intelligence promises to be the future of cybersecurity.
XYPRO’s XYGATE® User Authentication adds integration for RSA Cloud Authentication Service for HPE NonStop servers

XYPRO’s XYGATE® User Authentication adds integration for RSA Cloud Authentication Service for HPE NonStop servers

XYPRO Technology is a certified RSA Ready Technology partner. XYGATE User Authentication (XUA) now supports the RSA Cloud Authentication Service as a second factor of authentication for HPE NonStop servers. RSA is one of the world’s most widely deployed two-factor authentication solutions. Their certification program assures the solution customers are deploying has been verified interoperable…
Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection

Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection

Big Breaches, Big Data, Big Context - How to Empower the Next Generation of Security Threat Detection It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute's 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach.…
Proactive Security and Threat Detection – it’s not That SIEMple

Proactive Security and Threat Detection – it’s not That SIEMple

Proactive Security and Threat Detection - it’s not That SIEMple Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a controllable incident and a headline grabbing, catastrophic data breach. Most organizations cannot…
XYPRO XYGATE® Identity Connector for HPE NonStop, Certified for CyberArk®

XYPRO XYGATE® Identity Connector for HPE NonStop, Certified for CyberArk®

XYPRO XYGATE® Identity Connector for HPE NonStop, Certified for CyberArk® One of the largest security risks to any organization is stale privileged accounts or the misuse, compromise or sharing of those accounts. Privileged accounts have elevated access to perform administrative type functions. They can be administrator accounts, service accounts, firecall or emergency accounts, database connection…
Learning from the Marriott International Data Breach

Learning from the Marriott International Data Breach

Learning from the Marriott International Data Breach (originally published in Grit Daily) The Marriott data breach highlighted several critical deficiencies in their cybersecurity mindset, plan & resources. Marriott International has admitted to an ongoing breach in its network since 2014 with nearly 500 million records stolen. These included social security numbers, passport numbers, email addresses,…
Election CyberSecurity: We Are Still Playing Catch-up

Election CyberSecurity: We Are Still Playing Catch-up

Election CyberSecurity: We Are Still Playing Catch-up   Cybersecurity is a complex topic. Politics is a complex topic. Combine the two and there is a potential recipe for disaster. Election CyberSecurity gets more complex factoring in that administration of elections are a state and local government responsibility. There are over 50 different election systems and…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation