Articles

SunTUG 2023 Recap

Sean Bicknell

What better way to start the annual NonStop Conference calendar than with a trip to SunTUG in Florida?!
Many thanks to Pat, Teri and the SunTUG team for organising a great event and many thanks to all attendees who helped make it one of my favourite events of the year… the less said about our team’s golf performance the better, though!

Cover Story

CSP: Keeping NonStop community’s secrets safe

Henry Fonseca

Can you keep a secret? How often have we heard or used that expression? In certain circles, the surest way to spread a story is to suggest that it is secret, even top secret, but for those involved in IT, this is far from the truth.

Articles

Seven Magnificent Features All Integrity Monitors Should Have

Daniel Lewis

Winston Churchill once said “To improve is to change; to be perfect is to change often”. While that might have been a smart way to justify his changing of political party allegiance (and true when it comes to passwords!), it obviously doesn’t sit quite so well when it comes to critical files and configurations on your HPE NonStop!

Articles

GDPR 2021 – Compliance and Penalties; 3 Years Later

Steve Tcherchian

The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based.

Articles

NuWaves API Security Guide – Best Practices for REST Services

Dave Belliveau

REST has become the standard for information exchanged between disparate platforms and applications within the enterprise. In the NonStop space it is being used more and more, to allow NonStop applications to communicate with other enterprise applications, and integrate with solutions outside the enterprise.

Articles

One of Thailand’s Largest Bank Implements PCI Compliant Data Protection on Countrywide Banking Network

Thomas Gloerfeld

This Bank has the largest network of ATMs and branches in Thailand, with nearly 6,000 ATMs and over 1,000 branches throughout the country. They handle the travel, capital accumulation, and home deposit savings of millions of citizens. The Bank’s total assets amount to 2.62 trillion baht (THB), equivalent to approximately 80 billion USD, and in 2014 it had an operating income of 26.9 billion baht or approximately 826 million USD.

Articles

PCI DSS 4.0

Steve Tcherchian

Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in April 2015 which highlighted the risks of SSL and TLS 1.0. The supplement described a migration plan as well as set a migration deadline of 1 July, 2016.

Articles

Ensuring Data Privacy and Security

Trevor J. Morgan

In the amorphous field of cybersecurity, data privacy is a pretty hot topic, especially in the HPE NonStop space considering the vast amount of personal, sensitive data processed on NonStop solutions across the globe.

Articles

Improve Compliance with File Integrity Monitoring

Henry Fonseca

File integrity monitoring (FIM) exists because change is inescapable for most organizations. From variations in a company’s hardware assets, software programs, configuration states, permissions, and personnel, it is the one constant within IT environments. Some of these modifications may be authorized, while others will cause concern by their unexpected nature. Because of this, FIM is considered a vital requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files and protect business assets.

Articles

5 Best Practices for HPE NonStop File Integrity Monitoring

Steve Tcherchian

File Integrity Monitoring (FIM) is a foundational requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files, diagnose unwanted or inadvertent changes, and shut down attacks before they have a chance to cause damage and disruption.