Data Centric Security

12
May

Are CISOs Prepared to manage today’s security threat and achieve digital resilience?

As organisations embark on digital transformation journey, the CISOs role will expand and may even elevate in taking strategic decisions. Let’s take a look at the different hats the CISOs should don to build a cyber-resilient organization.

17
Feb

How to protect your sensitive data with automatic classification and labeling

In today’s data-driven environment it is highly important to ensure the security of your sensitive data. Manually protecting data is time consuming and cumbersome. Learn how to automate your data security with HALOCORE® and HALOCAD®

20
Dec

Will China’s Personal Information Protection Law be a game-changer for data security?

The law which came into effect on 1st November 2021, will provide a legal foundation for the protection of personal information of foreign business operations in China and it will also potentially limit cross-border transfer of critical information due to national security.

27
Nov

CISA Releases New Tool to Help Organizations Prevent Insider Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool that can help organizations mitigate insider threats. Let’s explore more about insider threats and how businesses can leverage this tool to protect themselves from potential insider threats.

10
Sep

8 Benefits of Implementing a Zero Trust Architecture

Zero Trust is gaining momentum. Organizations implementing Zero Trust architecture witness fewer data breaches. There are several benefits when you implement a Zero Trust Architecture, some are listed in the blog post.

24
Aug

7 Strategies to Keep Business Data Secure

Cyberattacks are on the rise. The growing number of internet-connected devices and the value of business data means cybercriminals have more to gain than ever from breaking into a company’s network. Here are the seven most important cybersecurity tactics for a business to use. Employing them will help keep company data secure.

4
Aug

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access sensitive data. Learn more about how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.

26
Jul

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business.

14
Jul

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can take to keep their sensitive supply chain data safe.

28
Jun

The Colonial Pipeline Ransomware Attack: The Fallout and Its Implications

This blog was written by an independent guest blogger. The Colonial Pipeline ransomware attack is one of the most recent and high-profile cybersecurity events affecting a public or private organization. However, what’s most frightening about it is the implications it has for the future of digital technologies.