Blog

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is,…

Continue Reading

Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure. To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or…

Continue Reading

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last…

Continue Reading

XYPRO Technology is a certified RSA Ready Technology partner. XYGATE User Authentication (XUA) now supports the RSA Cloud Authentication Service as a second factor of authentication for HPE NonStop servers. RSA is one of the world’s most widely deployed two-factor authentication solutions. Their certification program assures the solution customers are deploying has been verified interoperable…

Continue Reading

Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it…

Continue Reading

Proactive Security and Threat Detection – it’s not That SIEMple   Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation   Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a…

Continue Reading

The New Regulatory Terrain for Data Privacy 2018 saw the introduction of The General Data Protection Regulation, or GDPR. A major piece of legislation designed to address the protection and responsible use European Union citizens’ personal data. GDPR is not an EU only regulation; it affects any business or individual handling the data of EU…

Continue Reading

XYPRO XYGATE® Identity Connector for HPE NonStop, Certified for CyberArk® One of the largest security risks to any organization is stale privileged accounts or the misuse, compromise or sharing of those accounts. Privileged accounts have elevated access to perform administrative type functions. They can be administrator accounts, service accounts, firecall or emergency accounts, database connection…

Continue Reading

Learning from the Marriott International Data Breach (originally published in Grit Daily) The Marriott data breach highlighted several critical deficiencies in their cybersecurity mindset, plan & resources. Marriott International has admitted to an ongoing breach in its network since 2014 with nearly 500 million records stolen. These included social security numbers, passport numbers, email addresses,…

Continue Reading

November 20, 2018 • XYPRO Technology

Risk Management in the Real World: Today, Tomorrow and Beyond 2018 was another troubling year in the cybersecurity world. We saw a repeat of last year’s data breaches on a larger scale. Google, Toyota, Facebook, Under Armour, LifeLock, Air Canada, Blue Cross and many, many more fell victim to some sort of compromise. Hardly a…

Continue Reading