Richard BlechFeb 22Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechFeb 14SD-WAN Protecting Data to the CloudThe modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard BlechJan 31Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 24What Should be Guiding Your Data Protection StrategyThe cyber landscape has become an ideal environment for malicious actors who want to ramp up their cyberattacks. This is why data...
Richard BlechJan 17Data Governance and EncryptionData governance is more than a requisite part of data management that handles vast amounts of and numerous types of data. It helps form...
Richard BlechJan 10Are Cryptographically Relevant Quantum Computers Prepared to Disrupt Classical EncryptionAt XSOC CORP, we have always maintained the necessity of using quantum-safe cryptography and encryption solutions. Quantum computing or...
Richard BlechDec 20, 2021Data Security for the New Normal-The Hybrid WorkplaceAs the world tries to emerge from the worldwide pandemic and the hybrid workplace surfaces as a permanent fixture for many organizations,...
Richard BlechDec 6, 2021How To Reduce Your Attack Surface The size of an organization’s attack surface matters. Effectively securing large attack surfaces is difficult because it is cumbersome to...
Richard BlechNov 29, 2021Electric Vehicles Race to Ubiquitous Built-in CybersecurityAs the automotive industry continues to leverage technology advancements to create connected, electric and autonomous vehicles, it has to...
Richard BlechNov 8, 2021No Games When Protecting Data in the Online Game IndustryEven as the online game industry is on track to be worth $196 billion by 2022, its cybersecurity issues abound. The online game...
Richard BlechNov 1, 2021Deter Cyber Attacks by Thinking Like a Threat ActorThere can be a wide gap between the cyber threat actor’s capability for launching a cyber attack and infiltrating an organization’s IT...
Richard BlechOct 26, 2021Big Data EncryptionThere are many use cases for big data across the various industries. Organizations apply predictive analytic algorithms, data...
Richard BlechOct 18, 2021Cyber Resilience and Protecting Data-at-RestWhen we speak of data-at-rest, we refer to data that is kept in some type of storage instrument. This can include file storage, servers,...
Richard BlechOct 11, 2021Ubiquitous, Unadulterated Encryption: A Fundamental Pillar of Cyber Resilience Encryption is a key element of an effective comprehensive cybersecurity framework. In particular, the end-to-end encryption solutions...
Richard BlechOct 6, 2021Data Encryption for the EdgeEdge computing is a network principle that situates the processing, analysis and storage of data as close as possible to data sources or...
Richard BlechSep 27, 2021Battlefield Communication Security Enables the MissionTechnology has always had a role in defining the battlefield. Today’s battlefield environment has a digital ecosystem that is centered on...
Richard BlechSep 21, 2021Situational Awareness: Preventing Cyber IP TheftHow safe are your organization’s intellectual property assets? IP, which include patents, copyrights, trademarks and trade secrets,...
Richard BlechSep 13, 2021Getting the Most out of Wi-Fi 6E, SecurelyThe rise in demand for more agile and secure Wi-Fi connectivity is not surprising. Organizations want to transition to the cloud as...
Richard BlechSep 7, 2021Why You Should Care About the Limitations of Cloud EncryptionI doubt if you can find an organization today that doesn’t have at least some of their applications and data spread across different...
Richard BlechAug 30, 2021The Supply Chain Attack ProblemThere is an increasing reliance on managed service providers and online IT management solutions—tools that have significant authority and...