Richard BlechFeb 7, 2022Protecting Against Encrypted Log4j AttacksEven though CISA officials stated earlier this month that the Log4j security vulnerability (CVE-2021-44228) has not resulted in any major...
Richard BlechJan 31, 2022Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 24, 2022What Should be Guiding Your Data Protection StrategyThe cyber landscape has become an ideal environment for malicious actors who want to ramp up their cyberattacks. This is why data...
Richard BlechJan 17, 2022Data Governance and EncryptionData governance is more than a requisite part of data management that handles vast amounts of and numerous types of data. It helps form...