
Security


2024 Top 5 Cybersecurity Predictions
Steve Tcherchian
ETI challenges the status quo and transforms with BackBox® / QoreStor® / Sentinel
ETI-NET Marketing Team
Privacy-by-Design Becomes an ISO Standard: a New Driver for Data-Centric Security
Thomas Gloerfeld
XYPRO 2023 Cybersecurity Predictions: What to Expect in the Coming Year
Steve Tcherchian
PCI DSS 4.0 – Simplify Compliance in a NonStop World
Steve Tcherchian
The power of NonStop data analytics – Part II – introducing safePoint Logstream –
Thomas Gloerfeld
PROTECTING YOUR DATA: WHO IS RESPONSIBLE?
Henry FonsecaThere are several different factors to consider when thinking about protecting your data. The subject can be complex and usually involves multiple parties.
Let’s begin with a simple thought exercise. Think about how much personal information you share on a day-to-day basis, online or otherwise. Consider who and what you interact with; applications, devices, websites, humans, corporations, etc. How much time do you spend thinking who has access to your data and what they could do with it? What are some of the things that you do to ensure you are protecting your valuable information?
Protecting your business with data-centric security on HPE NonStop
Thomas Gloerfeld
Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection
Steve TcherchianIt can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.

Proactive Security and Threat Detection – it’s not that SIEMple
Steve Tcherchian