Richard BlechDec 6, 2021How To Reduce Your Attack Surface The size of an organization’s attack surface matters. Effectively securing large attack surfaces is difficult because it is cumbersome to...
Richard BlechNov 29, 2021Electric Vehicles Race to Ubiquitous Built-in CybersecurityAs the automotive industry continues to leverage technology advancements to create connected, electric and autonomous vehicles, it has to...
Richard BlechSep 21, 2021Situational Awareness: Preventing Cyber IP TheftHow safe are your organization’s intellectual property assets? IP, which include patents, copyrights, trademarks and trade secrets,...
Richard BlechSep 7, 2021Why You Should Care About the Limitations of Cloud EncryptionI doubt if you can find an organization today that doesn’t have at least some of their applications and data spread across different...
Michael FeinbergAug 6, 2021Dark Reading and RMMDespite enormous efforts and sums of money spent on cybersecurity, threat detection, and education, the breaches and hacks just keep...
nevans173Jul 29, 20215 Steps You Need To Take If You're On Social MediaLike all cybercrimes, social engineering is a business for hackers and one that can have drastic impacts on the lives' of those who fall...
Richard BlechJul 26, 2021A Look at DDoS and Disrupting its DisruptionDistributed denial-of-service, or DDoS, attacks have become more powerful and frequent. According to one report, the number of DDoS...
Richard BlechJul 13, 2021What does 5G mean for IIoT Data Security?Due to its capability for automating and communicating with devices, utilization of IIoT is becoming standard for a growing number of...
nevans173Jul 13, 2021How The Kaseya Attack Could Have Potentially Been AvoidedIn most recent cybersecurity news, we have seen yet another large breach. But this time, the impact outweighed all cyberattacks we have...
Richard BlechJul 6, 2021Massive Ransomware Attack of Kaseya a Major Blow to MSSP Business ModelKaseya, one of the largest Managed Security Services Provider (MSSP), itself, became the victim of the largest ransomware attack in...
Richard BlechJun 28, 2021The Cybersecurity Executive Order: A Standard for All Organizations?By issuing Executive Order on Improving the Nation’s Cybersecurity, the White House created a tool critical to reinforcing federal...
Richard BlechMay 24, 2021Meeting Today's Challenges with XSOC EncryptionThe ways data can be manipulated are evolving as quickly as the internet. Cyber attackers have innovation, take advantage of timing and ...
Richard BlechMay 7, 2021Safeguarding the World's Data: A New Solution to Data SecurityDATA IS ALWAYS AT RISK The digital transformation has made sharing data necessary. It is digitalizing the workforce, making it more...
Richard BlechMay 6, 2021Meeting Today’s Challenges by Securing Our DataIt has been recently said that “the world’s most valuable resource is no longer oil, but data.” Stored and transmitted data is under...