Category Archives: Cybersecurity

Badmouthing Data Loss Prevention (DLP) is Fashionable

Badmouthing Data Loss Prevention (DLP) is Fashionable   Is DLP Really Dead?   I recently came across several digital security vendor sites who describe themselves as a “DLP alternative.” Perusing through their pages, I came across comments such as “DLP is hard to deploy”, “DLP is hard to maintain” and the classic: “DLP is heavy…
Read more

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Insider Threats and the difficulty in stopping data breaches

Insider Threats and the difficulty in stopping data breaches In dealing with today’s digital-threats, the main focus of companies, is by far on preventing attacks emanating from outside the organization.   Businesses invest fortunes on bolstering their digital defenses with ‘traditional’ tools such as firewalls and antivirus programs. Current estimates put the average number of…
Read more

Dangerous Cyber Attack Techniques Part 2

Dangerous Cyber Attack Techniques Part 2 Password Reuse and Weak Passwords The weak password is far the most common factor resulting in the compromise of networks worldwide   Research has shown than over 80 percent of all data breaches are caused by stolen passwords. And hackers manage to get their hands on passwords mostly by…
Read more

The Most Dangerous Cyber Attack Techniques and How to Confront Them

The Most Dangerous Cyber Attack Techniques and How to Confront Them   Numbers on global trends in cyber attacks are pretty clear: hackers are making it big.   Over the past year, the rates of many forms of cyber attacks increased dramatically, in some cases doubling or even tripling in size, leading to widespread penetration…
Read more