What is Software defined perimeter and Zero Trust

What is Software-defined perimeter and Zero Trust?   In the digital age, experts are constantly on the search for the best model of information security.   While most improvements constitute tweaks or upgrades to existing paradigms, some designs have required a complete break with the past.   Two models, in particular, exemplify this. Defining the…
Read more

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The Email Compromise Scourge BEC operations…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Big data, heavy data & DCAP

Big data, heavy data & DCAP With information volumes surging and compliance burdens growing, enterprises need a new approach to data security   By 2025 humans will have generated 180 zettabytes of data [i]– or 180 trillion gigabytes. That’s a lot, and well up from the mere 10 zettabytes we’d created back in 2015. Managing…
Read more

Dangerous Cyber Attack Techniques Part 2

Dangerous Cyber Attack Techniques Part 2 Password Reuse and Weak Passwords The weak password is far the most common factor resulting in the compromise of networks worldwide   Research has shown than over 80 percent of all data breaches are caused by stolen passwords. And hackers manage to get their hands on passwords mostly by…
Read more