Richard BlechFeb 22, 2022Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechJan 3, 2022Encryption and Data Security Lessons Learned in 2021The importance of data security and encryption’s role in it has never been more evident than in 2021. Here are a few lessons and...
Richard BlechOct 26, 2021Big Data EncryptionThere are many use cases for big data across the various industries. Organizations apply predictive analytic algorithms, data...
Richard BlechOct 11, 2021Ubiquitous, Unadulterated Encryption: A Fundamental Pillar of Cyber Resilience Encryption is a key element of an effective comprehensive cybersecurity framework. In particular, the end-to-end encryption solutions...
Richard BlechSep 7, 2021Why You Should Care About the Limitations of Cloud EncryptionI doubt if you can find an organization today that doesn’t have at least some of their applications and data spread across different...
Michael FeinbergAug 6, 2021Dark Reading and RMMDespite enormous efforts and sums of money spent on cybersecurity, threat detection, and education, the breaches and hacks just keep...
Richard BlechAug 2, 2021The Disconnection of PKIPublic key infrastructure, or PKI, is widely used because it can both encrypt data and confirm that the party with whom a user, device or...
Richard BlechJun 14, 2021Why Encryption Should be at the Application LevelFundamentally, cybersecurity regulates what data is accessible to whom or what. Encryption is a key component of cybersecurity. In fact,...
Richard BlechMay 24, 2021Meeting Today's Challenges with XSOC EncryptionThe ways data can be manipulated are evolving as quickly as the internet. Cyber attackers have innovation, take advantage of timing and ...