Yearly Archives: 2018

Zero Trust Data Protection

Zero Trust Data Protection Out with the Old Conventional security models, those based on firewalls, IDS, and the like, operate on the outdated assumption that “everything on the inside of an organization’s network can be trusted”.   The contemporary threat … Read More

Endpoint Protection with Discovery

Blockchain the Pros and Cons

In an era where cyberattacks can paralyze entire networks, the need for effective, reliable IT security has become paramount.   Some think they have found the silver bullet in the war against hackers. The Blockchain Revolution   When Bitcoin creator … Read More

California Consumer Privacy Act & NYDFS 23 NYCRR 201

Increasingly demanding data regulations.   The trend has been the strongest factor affecting the world of IT over the past several years.   Over the recent period, state, national, and international authorities have been producing legislation creating tight protocols for … Read More

Fileless Malware Taking on the Threat

Taking on the Threat of Fileless Malware Over the past two years, the IT industry has faced an important shift in the way cyber criminals go about their attacks.   Some of the biggest names in the field of cyber … Read More

Equifax submits statement to congressional committees regarding cybersecurity incidient

Equifax Submits Additional Statements to Congress Regarding the Incident Equifax submitted a statement to congressional committees to supplement the company’s responses regarding the extent of the incident impacting U.S. consumers.  “As announced on September 7, 2017, the information stolen by the attackers … Read More

Want to see something cool?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users



Try it for Free