with Ugan Naidoo

The COVID-19 pandemic led to increased digitization of businesses and as a result, created new opportunities for cybercriminals who actively exploited the health crisis and weak links in enterprises who were trying to adjust to the new reality. The Russian invasion of Ukraine has also triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates, smaller players, and opportunistic criminals – all benefited from the turmoil.

Read more

Inside

Articles

Discover Las Vegas 2022 Recap

Richard Buckle

  Author Richard Buckle Richard Buckle is the founder and CEO of Pyalla Technologies, LLC. He has enjoyed a long

Articles

BITUG Back in the Real World

Iain Liston-Brown

Wow, after two years, six months, and six days, the BITUG regional user group for the HPE NonStop community in

Articles

Ransomware Recovery Proposed

Richard Conine

You did everything right. But… despite well-documented ITSM Security Policies, enforced user training, and expensive tools, the worst has happened.

Articles

Accelerate and Automate SAP HANA Security Compliance with Workload Aware Security Layer (WASL) from HPE and XYPRO

Steve Tcherchian

In most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, highly scalable in-memory database that serves as a platform for enterprise resource planning (ERP) applications and other business workloads that need to analyze data in real time.

Articles

Future of Money – Part 2

Idelji Corporation

This is the second part of “Future of Money”. The first part was published in the previous issue, where we covered topics regarding the definition of money and its position vs. currency. We also discussed the emergence of crypto and stable currencies, their relevance, and how they’ve established themselves within our societies worldwide.

blog top 5 sources of data breaches
Articles

Top 5 sources of data breaches

Dan Simmons

Corporate IT security teams are often accused of being too reactive in their approach to threat defense. Yet it’s unfortunately

News & More

Leader's notes

A Note from Connect Leadership

Marty Edelman

  Author Marty Edelman Since retiring from The Home Depot, Marty Edelman has provided strategic guidance to organizations wishing to

July-August 2022

News from HPE’s NonStop Division

Roland Lemoine

  Author Roland Lemoine Roland Lemoine has been working on NonStop for 23 years and is currently the product manager

In Every Issue

July-August 2022

NonStop Trends & Wins

Justin Simonds

I’ve been doing a lot of research recently based on an article I read online. It was discussing human trafficking and that there were patterns in the transaction flow that could identify this activity. I was intrigued. I was quite surprised to learn that, depending on the poll, human trafficking was either the second or third largest revenue source for criminals.

Follow on Facebook