Richard BlechFeb 22Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechFeb 14SD-WAN Protecting Data to the CloudThe modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard BlechDec 13, 2021Malware Hiding in Encrypted Traffic Becomes an Increasing ThreatThe sharp increase in the use of encryption has changed the cybersecurity landscape. Organizations are rightfully ramping up their use of...
Richard BlechOct 18, 2021Cyber Resilience and Protecting Data-at-RestWhen we speak of data-at-rest, we refer to data that is kept in some type of storage instrument. This can include file storage, servers,...
Richard BlechAug 9, 2021Improving Cybersecurity Solutions with Cyberattack DisclosureCyberattacks have crossed a threshold. Nation-state entities routinely engage in bold, malicious cyber activities against the United...
Richard BlechJul 13, 2021What does 5G mean for IIoT Data Security?Due to its capability for automating and communicating with devices, utilization of IIoT is becoming standard for a growing number of...
Richard BlechJun 21, 20216 Vulnerabilities that Make IoT and IIoT Devices InsecureIoT and IIoT are used to move field data into cloud systems so that the data can be managed and shared among numerous users and...
Richard BlechJun 8, 2021Meeting Today's Challenges with EBP - Encrypted Broadcast ProtocolMoving gigabytes, terabytes and even petabytes of data have become a matter of routine for organizations across all industries. And the...
Richard BlechJun 3, 2021Meeting Today's Challenges with WAN-SOCKETWAN-SOCKET FULFILLS NEED FOR END-TO-END ENCRYPTION Being able to leverage a global network or the internet to improve operations or...
Richard BlechMay 14, 2021Cyber attacks on critical infrastructure have become en vogueICS security is a very important area of cryptography because many countries and global organizations depend on SCADA systems to protect...