Richard BlechFeb 14SD-WAN Protecting Data to the CloudThe modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard BlechFeb 7Protecting Against Encrypted Log4j AttacksEven though CISA officials stated earlier this month that the Log4j security vulnerability (CVE-2021-44228) has not resulted in any major...
Richard BlechDec 27, 2021Protecting Healthcare Systems from 3 Major Cyber ThreatsThe persistent cost of digitizing industries is the ever-present cyberattack. This is especially true for the healthcare industry, which...
Richard BlechNov 8, 2021No Games When Protecting Data in the Online Game IndustryEven as the online game industry is on track to be worth $196 billion by 2022, its cybersecurity issues abound. The online game...
Richard BlechAug 30, 2021The Supply Chain Attack ProblemThere is an increasing reliance on managed service providers and online IT management solutions—tools that have significant authority and...
Richard BlechAug 9, 2021Improving Cybersecurity Solutions with Cyberattack DisclosureCyberattacks have crossed a threshold. Nation-state entities routinely engage in bold, malicious cyber activities against the United...
Michael FeinbergAug 6, 2021Dark Reading and RMMDespite enormous efforts and sums of money spent on cybersecurity, threat detection, and education, the breaches and hacks just keep...
nevans173Jul 29, 20215 Steps You Need To Take If You're On Social MediaLike all cybercrimes, social engineering is a business for hackers and one that can have drastic impacts on the lives' of those who fall...
Richard BlechJul 13, 2021What does 5G mean for IIoT Data Security?Due to its capability for automating and communicating with devices, utilization of IIoT is becoming standard for a growing number of...
nevans173Jul 13, 2021How The Kaseya Attack Could Have Potentially Been AvoidedIn most recent cybersecurity news, we have seen yet another large breach. But this time, the impact outweighed all cyberattacks we have...
Richard BlechJul 6, 2021Massive Ransomware Attack of Kaseya a Major Blow to MSSP Business ModelKaseya, one of the largest Managed Security Services Provider (MSSP), itself, became the victim of the largest ransomware attack in...
Richard BlechJun 28, 2021The Cybersecurity Executive Order: A Standard for All Organizations?By issuing Executive Order on Improving the Nation’s Cybersecurity, the White House created a tool critical to reinforcing federal...
Richard BlechJun 3, 2021Rise in Low Sophisticated OT BreachesIT/OT convergence has been a necessary progression of the industrial environment in the digital age. However, while industrial...
Richard BlechMay 14, 2021Cyber attacks on critical infrastructure have become en vogueICS security is a very important area of cryptography because many countries and global organizations depend on SCADA systems to protect...
Richard BlechMay 7, 2021Safeguarding the World's Data: A New Solution to Data SecurityDATA IS ALWAYS AT RISK The digital transformation has made sharing data necessary. It is digitalizing the workforce, making it more...
Richard BlechMay 6, 2021Meeting Today’s Challenges by Securing Our DataIt has been recently said that “the world’s most valuable resource is no longer oil, but data.” Stored and transmitted data is under...