Richard BlechFeb 7, 2022Protecting Against Encrypted Log4j AttacksEven though CISA officials stated earlier this month that the Log4j security vulnerability (CVE-2021-44228) has not resulted in any major...
Richard BlechJan 31, 2022Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 24, 2022What Should be Guiding Your Data Protection StrategyThe cyber landscape has become an ideal environment for malicious actors who want to ramp up their cyberattacks. This is why data...