News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Filter by Categories
A Software Engineer’s Guide to Cloud Migration

A Software Engineer’s Guide to Cloud Migration

Many organizations have a cloud migration strategy for their mission-critical workloads to offer flexibility, scalability, and business continuity.  There are many reasons for migrating to the cloud.  Modernization, getting with the times, attracting talent, increasing value, disaster recovery, reducing overhead, reducing risks, and saving money.  The list in favor of cloud migration gets longer as…
After the CISO role: Navigating what comes next

After the CISO role: Navigating what comes next

"It was a 24/7 job; there was no downtime," Zalewski said, adding that he used to describe his role as running a triage shop. "I constantly had people coming in that had been attacked. My job was not to make them whole but to understand how to limit the damage to that line of business…
How to Become a Chief Information Security Officer

How to Become a Chief Information Security Officer

Chief information security officers (CISOs) stand atop the cybersecurity career ladder. Only the most educated and experienced professionals reach this level of the field to oversee large cybersecurity teams, systems, and operations. According to the Federal Bureau of Investigations, cybercrime losses approached $7 billion in 2021 alone. Cyberattacks can ruin organizations and lives as the…
A Day in the Life of a Chief Information Security Officer

A Day in the Life of a Chief Information Security Officer

A chief information security officer (CISO) oversees organization-wide information technology (IT) security issues. These advanced professionals create data management and security policies, manage IT security workers, and introduce new technologies. Someone might become a CISO to earn more money and advance their career after gaining significant IT experience. The role offers high earning potential in…
XYPRO at HPE NonStop TBC 2022

XYPRO at HPE NonStop TBC 2022

This year’s NonStop Technical Boot Camp (TBC) returned live and in-person! As a key HPE Partner, XYPRO is always grateful to Connect and HPE for pulling out all the stops to make the TBC a wonderful experience. With many sessions from which to choose, it was gratifying to have so many attendees join XYPRO’s Chief…
Ransomware attacks: is there a case for paying up?

Ransomware attacks: is there a case for paying up?

To pay or not to pay? For companies unfortunate enough to be hit by a ransomware attack, that is the crucial question. Ransomware attacks — in which cyber criminals lock up a victim’s data or computer system and release it only if a ransom is paid — exploded in 2020 and 2021, in part because…
XYPRO at HPE NonStop Technical Boot Camp 2022

XYPRO at HPE NonStop Technical Boot Camp 2022

NonStop Technical Boot Camp 2022 (TBC) is back in person at the Hyatt Regency SFO in Burlingame, CA.  There is still time to Register!    Steve Tcherchian, XYPRO’s CISO and Chief Product Officer is presenting “PCI DSS 4.0  Simplify Compliance in a NonStop World”  - November 8th at 3:35 PM in Regency B.  Working with…
Types of Identity Theft

Types of Identity Theft

Common Types of Identity Theft To protect yourself from any kind of ID theft, it's important to be careful with your personal information. An identity theft protection service can go a long way toward keeping your information safe and promptly notifying you if someone may have stolen it. That said, here are some common types…
Servicenow Integration for HPE NonStop Servers

Servicenow Integration for HPE NonStop Servers

It can be difficult to enforce proper change management in an expanding IT ecosystem. Inadequate change control exposes you to cybersecurity risks and compliance issues. Servicenow IT Service Management (ITSM) is the primary solution for IT change management in many environments. ServiceNow ensures that all activity is tracked and visible by using an approved change…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation