Custom Blog Grids

Create custom blog pages using custom grids

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology

June 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

June 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric Security.

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can

Five key points to consider for implementing a successful EDRM Project

The reason enterprise digital rights management (EDRM) finds increased adoption with the enterprise is the technology provides persistent data

SECUDE Announces New HALOCAD Plug-in for Bentley’s MicroStation

SECUDE, a leading data security provider specializing in security for SAP® software, are excited to announce a new HALOCAD Plug-in for Bentley’s

SECUDE Announces Integration of Autodesk Vault with Microsoft Information Protection

SECUDE, a leading data security provider specializing in data security for SAP Enterprise and CAD software, today announced to support IP protection

The Colonial Pipeline Ransomware Attack: The Fallout and Its Implications

This blog was written by an independent guest blogger. The Colonial Pipeline ransomware attack is one of the most recent and high-profile

Security-First: Why It’s Right and What It Means

This blog was written by an independent guest blogger. Security-first, as the name implies, means considering cybersecurity at the center of every

May 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

May 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric Security.

What is Enterprise Digital Rights Management (EDRM)?

Enterprise Digital Rights Management (EDRM) sometimes referred to as Information Rights Management (IRM) is a core-data-centric technology that

The fall of passwords and the rise of Zero Trust

Password protection alone is not sufficient especially in manufacturing and design, healthcare industry, and industries that use a lot of proprietary