Richard BlechFeb 22, 2022Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechFeb 14, 2022SD-WAN Protecting Data to the CloudThe modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard BlechJan 31, 2022Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 24, 2022What Should be Guiding Your Data Protection StrategyThe cyber landscape has become an ideal environment for malicious actors who want to ramp up their cyberattacks. This is why data...