top of page
LATEST
Search
Richard Blech
Feb 22, 2022
Strong Cryptosystems Needed for Resource-Constrained IoT
You don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard Blech
Jan 31, 2022
Securing Data Lakes
There are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard Blech
Jan 17, 2022
Data Governance and Encryption
Data governance is more than a requisite part of data management that handles vast amounts of and numerous types of data. It helps form...
Richard Blech
Jan 10, 2022
Are Cryptographically Relevant Quantum Computers Prepared to Disrupt Classical Encryption
At XSOC CORP, we have always maintained the necessity of using quantum-safe cryptography and encryption solutions. Quantum computing or...
Richard Blech
Oct 18, 2021
Cyber Resilience and Protecting Data-at-Rest
When we speak of data-at-rest, we refer to data that is kept in some type of storage instrument. This can include file storage, servers,...
Richard Blech
Oct 11, 2021
Ubiquitous, Unadulterated Encryption: A Fundamental Pillar of Cyber Resilience
Encryption is a key element of an effective comprehensive cybersecurity framework. In particular, the end-to-end encryption solutions...
bottom of page