Blog

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make business decisions and provide strategic insights that gives companies a competitive advantage. This can be in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the…

Continue Reading

XYPRO Technology is a certified RSA Ready Technology partner. XYGATE User Authentication (XUA) now supports the RSA Cloud Authentication Service as a second factor of authentication for HPE NonStop servers. RSA is one of the world’s most widely deployed two-factor authentication solutions. Their certification program assures the solution customers are deploying has been verified interoperable…

Continue Reading

Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it…

Continue Reading

Proactive Security and Threat Detection – it’s not That SIEMple   Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation   Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a…

Continue Reading

The New Regulatory Terrain for Data Privacy 2018 saw the introduction of The General Data Protection Regulation, or GDPR. A major piece of legislation designed to address the protection and responsible use European Union citizens’ personal data. GDPR is not an EU only regulation; it affects any business or individual handling the data of EU…

Continue Reading

XYPRO XYGATE® Identity Connector for HPE NonStop, Certified for CyberArk® One of the largest security risks to any organization is stale privileged accounts or the misuse, compromise or sharing of those accounts. Privileged accounts have elevated access to perform administrative type functions. They can be administrator accounts, service accounts, firecall or emergency accounts, database connection…

Continue Reading

Learning from the Marriott International Data Breach (originally published in Grit Daily) The Marriott data breach highlighted several critical deficiencies in their cybersecurity mindset, plan & resources. Marriott International has admitted to an ongoing breach in its network since 2014 with nearly 500 million records stolen. These included social security numbers, passport numbers, email addresses,…

Continue Reading

November 20, 2018 • XYPRO Technology

Risk Management in the Real World: Today, Tomorrow and Beyond 2018 was another troubling year in the cybersecurity world. We saw a repeat of last year’s data breaches on a larger scale. Google, Toyota, Facebook, Under Armour, LifeLock, Air Canada, Blue Cross and many, many more fell victim to some sort of compromise. Hardly a…

Continue Reading

October 19, 2018 • XYPRO Technology

Election CyberSecurity: We Are Still Playing Catch-up   Cybersecurity is a complex topic. Politics is a complex topic. Combine the two and there is a potential recipe for disaster. Election CyberSecurity gets more complex factoring in that administration of elections are a state and local government responsibility. There are over 50 different election systems and…

Continue Reading

October 8, 2018 • XYPRO Technology

HPE Customer Solution Center Hosts Gathering of Mission Critical Experts in Atlanta Have you seen the movie ‘The Greatest Showman’ with Hugh Jackman? Jackman plays the ambitious P.T. Barnum. I don’t want to give away anything in the movie if you haven’t seen it. Suffice it to say, the circus finds their footing when they…

Continue Reading