News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Exact matches only
Filter by Categories
How to Become a Chief Information Security Officer

How to Become a Chief Information Security Officer

Chief information security officers (CISOs) stand atop the cybersecurity career ladder. Only the most educated and experienced professionals reach this level of the field to oversee large cybersecurity teams, systems, and operations. According to the Federal Bureau of Investigations, cybercrime losses approached $7 billion in 2021 alone. Cyberattacks can ruin organizations and lives as the…
A Day in the Life of a Chief Information Security Officer

A Day in the Life of a Chief Information Security Officer

A chief information security officer (CISO) oversees organization-wide information technology (IT) security issues. These advanced professionals create data management and security policies, manage IT security workers, and introduce new technologies. Someone might become a CISO to earn more money and advance their career after gaining significant IT experience. The role offers high earning potential in…
XYPRO at HPE NonStop TBC 2022

XYPRO at HPE NonStop TBC 2022

This year’s NonStop Technical Boot Camp (TBC) returned live and in-person! As a key HPE Partner, XYPRO is always grateful to Connect and HPE for pulling out all the stops to make the TBC a wonderful experience. With many sessions from which to choose, it was gratifying to have so many attendees join XYPRO’s Chief…
Ransomware attacks: is there a case for paying up?

Ransomware attacks: is there a case for paying up?

To pay or not to pay? For companies unfortunate enough to be hit by a ransomware attack, that is the crucial question. Ransomware attacks — in which cyber criminals lock up a victim’s data or computer system and release it only if a ransom is paid — exploded in 2020 and 2021, in part because…
XYPRO at HPE NonStop Technical Boot Camp 2022

XYPRO at HPE NonStop Technical Boot Camp 2022

NonStop Technical Boot Camp 2022 (TBC) is back in person at the Hyatt Regency SFO in Burlingame, CA.  There is still time to Register!    Steve Tcherchian, XYPRO’s CISO and Chief Product Officer is presenting “PCI DSS 4.0  Simplify Compliance in a NonStop World”  - November 8th at 3:35 PM in Regency B.  Working with…
Types of Identity Theft

Types of Identity Theft

Common Types of Identity Theft To protect yourself from any kind of ID theft, it's important to be careful with your personal information. An identity theft protection service can go a long way toward keeping your information safe and promptly notifying you if someone may have stolen it. That said, here are some common types…
Servicenow Integration for HPE NonStop Servers

Servicenow Integration for HPE NonStop Servers

It can be difficult to enforce proper change management in an expanding IT ecosystem. Inadequate change control exposes you to cybersecurity risks and compliance issues. Servicenow IT Service Management (ITSM) is the primary solution for IT change management in many environments. ServiceNow ensures that all activity is tracked and visible by using an approved change…
HPE NonStop SQL and XYPRO

HPE NonStop SQL and XYPRO

Where Manageability and Security Meet for a Common Goal The database manageability experience is in constant evolution. Not only because of new cloud consumption models but also with managed databases where the end customer is delegating the database administration tasks. This delegation may be to another group within the company, or to HPE GreenLake Managed…
Securing the Enterprise When Employees are Remote

Securing the Enterprise When Employees are Remote

Permitting workers to split their time between their home and office can improve job satisfaction and, in some cases, productivity. However, hybrid work arrangements can introduce additional layers of complexity and risk to an organization's technology systems and data. As such, IT departments need to consider several security technologies, processes, and policies to guard against…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation