Richard BlechFeb 22Strong Cryptosystems Needed for Resource-Constrained IoTYou don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard BlechFeb 14SD-WAN Protecting Data to the CloudThe modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard BlechFeb 7Protecting Against Encrypted Log4j AttacksEven though CISA officials stated earlier this month that the Log4j security vulnerability (CVE-2021-44228) has not resulted in any major...
Richard BlechJan 31Securing Data LakesThere are multiple use cases for data lakes. Many organizations will create the systems for archival or reference purposes, to comply...
Richard BlechJan 24What Should be Guiding Your Data Protection StrategyThe cyber landscape has become an ideal environment for malicious actors who want to ramp up their cyberattacks. This is why data...
Richard BlechJan 17Data Governance and EncryptionData governance is more than a requisite part of data management that handles vast amounts of and numerous types of data. It helps form...
Richard BlechJan 10Are Cryptographically Relevant Quantum Computers Prepared to Disrupt Classical EncryptionAt XSOC CORP, we have always maintained the necessity of using quantum-safe cryptography and encryption solutions. Quantum computing or...
Richard BlechJan 3Encryption and Data Security Lessons Learned in 2021The importance of data security and encryption’s role in it has never been more evident than in 2021. Here are a few lessons and...
Richard BlechDec 27, 2021Protecting Healthcare Systems from 3 Major Cyber ThreatsThe persistent cost of digitizing industries is the ever-present cyberattack. This is especially true for the healthcare industry, which...
Richard BlechDec 20, 2021Data Security for the New Normal-The Hybrid WorkplaceAs the world tries to emerge from the worldwide pandemic and the hybrid workplace surfaces as a permanent fixture for many organizations,...
Richard BlechDec 13, 2021Malware Hiding in Encrypted Traffic Becomes an Increasing ThreatThe sharp increase in the use of encryption has changed the cybersecurity landscape. Organizations are rightfully ramping up their use of...
Richard BlechDec 6, 2021How To Reduce Your Attack Surface The size of an organization’s attack surface matters. Effectively securing large attack surfaces is difficult because it is cumbersome to...
Richard BlechNov 29, 2021Electric Vehicles Race to Ubiquitous Built-in CybersecurityAs the automotive industry continues to leverage technology advancements to create connected, electric and autonomous vehicles, it has to...
Richard BlechNov 15, 2021The Continuous Threat of BotnetsBotnets are a pervasive type of cyberthreat that show no signs of waning. Threat actors are continuing to use these sophisticated types...
Richard BlechNov 8, 2021No Games When Protecting Data in the Online Game IndustryEven as the online game industry is on track to be worth $196 billion by 2022, its cybersecurity issues abound. The online game...
Richard BlechNov 1, 2021Deter Cyber Attacks by Thinking Like a Threat ActorThere can be a wide gap between the cyber threat actor’s capability for launching a cyber attack and infiltrating an organization’s IT...
Richard BlechOct 26, 2021Big Data EncryptionThere are many use cases for big data across the various industries. Organizations apply predictive analytic algorithms, data...
Richard BlechOct 18, 2021Cyber Resilience and Protecting Data-at-RestWhen we speak of data-at-rest, we refer to data that is kept in some type of storage instrument. This can include file storage, servers,...
Richard BlechOct 11, 2021Ubiquitous, Unadulterated Encryption: A Fundamental Pillar of Cyber Resilience Encryption is a key element of an effective comprehensive cybersecurity framework. In particular, the end-to-end encryption solutions...
Richard BlechOct 6, 2021Data Encryption for the EdgeEdge computing is a network principle that situates the processing, analysis and storage of data as close as possible to data sources or...