Cover Story

How to Protect Your Online Presence and Critical Infrastructure from Emerging Cyber Threats

Ugan Naidoo

The COVID-19 pandemic led to increased digitization of businesses and as a result, created new opportunities for cybercriminals who actively exploited the health crisis and weak links in enterprises who were trying to adjust to the new reality. The Russian invasion of Ukraine has also triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates, smaller players, and opportunistic criminals – all benefited from the turmoil.

July-August 2022

News from HPE’s NonStop Division

Roland Lemoine

Back in June, a few of us were able to enjoy again the value of a face-to-face event at HPE Discover 2022. It was a good opportunity to find out what we are offering under the HPE GreenLake umbrella and knowing so, start to reflect on what’s in it for us in the NonStop community.

July-August 2022

NonStop Trends & Wins

Justin Simonds

I’ve been doing a lot of research recently based on an article I read online. It was discussing human trafficking and that there were patterns in the transaction flow that could identify this activity. I was intrigued. I was quite surprised to learn that, depending on the poll, human trafficking was either the second or third largest revenue source for criminals.

Articles

BITUG Back in the Real World

Iain Liston-Brown

Wow, after two years, six months, and six days, the BITUG regional user group for the HPE NonStop community in

Articles

Ransomware Recovery Proposed

Richard Conine

You did everything right. But… despite well-documented ITSM Security Policies, enforced user training, and expensive tools, the worst has happened.

Articles

Accelerate and Automate SAP HANA Security Compliance with Workload Aware Security Layer (WASL) from HPE and XYPRO

Steve Tcherchian

In most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, highly scalable in-memory database that serves as a platform for enterprise resource planning (ERP) applications and other business workloads that need to analyze data in real time.

Articles

Future of Money – Part 2

Idelji Corporation

This is the second part of “Future of Money”. The first part was published in the previous issue, where we covered topics regarding the definition of money and its position vs. currency. We also discussed the emergence of crypto and stable currencies, their relevance, and how they’ve established themselves within our societies worldwide.

blog top 5 sources of data breaches
Articles

Top 5 sources of data breaches

Dan Simmons

Corporate IT security teams are often accused of being too reactive in their approach to threat defense. Yet it’s unfortunately