Richard BlechDec 13, 2021Malware Hiding in Encrypted Traffic Becomes an Increasing ThreatThe sharp increase in the use of encryption has changed the cybersecurity landscape. Organizations are rightfully ramping up their use of...
Richard BlechJul 19, 2021Man-in-the-Middle BreakdownHackers will expend significant resources and time in order to build credentials and gain access to a company’s sensitive data. From that...
Richard BlechJul 6, 2021Massive Ransomware Attack of Kaseya a Major Blow to MSSP Business ModelKaseya, one of the largest Managed Security Services Provider (MSSP), itself, became the victim of the largest ransomware attack in...
Richard BlechJun 28, 2021The Cybersecurity Executive Order: A Standard for All Organizations?By issuing Executive Order on Improving the Nation’s Cybersecurity, the White House created a tool critical to reinforcing federal...
Richard BlechJun 14, 2021Why Encryption Should be at the Application LevelFundamentally, cybersecurity regulates what data is accessible to whom or what. Encryption is a key component of cybersecurity. In fact,...
Richard BlechJun 8, 2021Meeting Today's Challenges with EBP - Encrypted Broadcast ProtocolMoving gigabytes, terabytes and even petabytes of data have become a matter of routine for organizations across all industries. And the...