Richard BlechJan 31Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechDec 20, 2021Data Security for the New Normal-The Hybrid WorkplaceAs the world tries to emerge from the worldwide pandemic and the hybrid workplace surfaces as a permanent fixture for many organizations,...
Richard BlechSep 21, 2021Situational Awareness: Preventing Cyber IP TheftHow safe are your organization’s intellectual property assets? IP, which include patents, copyrights, trademarks and trade secrets,...
Richard BlechSep 13, 2021Getting the Most out of Wi-Fi 6E, SecurelyThe rise in demand for more agile and secure Wi-Fi connectivity is not surprising. Organizations want to transition to the cloud as...
Richard BlechAug 23, 2021Zero-Day Attacks: A Proactive-Common Sense ApproachZero-day attacks can present a unique challenge to cybersecurity experts. How does an organization protect itself against unknown...
Richard BlechAug 16, 2021Trusting the Security of Modern Networks with Zero TrustThere have always been problems with implicit trust in network security, but these problems are magnified in the current digital...
Richard BlechAug 9, 2021Improving Cybersecurity Solutions with Cyberattack DisclosureCyberattacks have crossed a threshold. Nation-state entities routinely engage in bold, malicious cyber activities against the United...
nevans173Jul 29, 20215 Steps You Need To Take If You're On Social MediaLike all cybercrimes, social engineering is a business for hackers and one that can have drastic impacts on the lives' of those who fall...
Richard BlechJul 26, 2021A Look at DDoS and Disrupting its DisruptionDistributed denial-of-service, or DDoS, attacks have become more powerful and frequent. According to one report, the number of DDoS...
Richard BlechJul 13, 2021What does 5G mean for IIoT Data Security?Due to its capability for automating and communicating with devices, utilization of IIoT is becoming standard for a growing number of...
nevans173Jul 13, 2021How The Kaseya Attack Could Have Potentially Been AvoidedIn most recent cybersecurity news, we have seen yet another large breach. But this time, the impact outweighed all cyberattacks we have...
Richard BlechMay 7, 2021Safeguarding the World's Data: A New Solution to Data SecurityDATA IS ALWAYS AT RISK The digital transformation has made sharing data necessary. It is digitalizing the workforce, making it more...
Richard BlechMay 6, 2021Meeting Today’s Challenges by Securing Our DataIt has been recently said that “the world’s most valuable resource is no longer oil, but data.” Stored and transmitted data is under...