Richard BlechFeb 22, 2022Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechJan 31, 2022Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 17, 2022Data Governance and EncryptionData governance is more than a requisite part of data management that handles vast amounts of and numerous types of data. It helps form...
Richard BlechJan 10, 2022Are Cryptographically Relevant Quantum Computers Prepared to Disrupt Classical EncryptionAt XSOC CORP, we have always maintained the necessity of using quantum-safe cryptography and encryption solutions. Quantum computing or...
Richard BlechOct 18, 2021Cyber Resilience and Protecting Data-at-RestWhen we speak of data-at-rest, we refer to data that is kept in some type of storage instrument. This can include file storage, servers,...
Richard BlechOct 11, 2021Ubiquitous, Unadulterated Encryption: A Fundamental Pillar of Cyber Resilience Encryption is a key element of an effective comprehensive cybersecurity framework. In particular, the end-to-end encryption solutions...