The Data Centric Security Blog

Get the latest updates about trending topics in Data Security.

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access ...

Read more

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology ...

Read more

June 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

June 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric Security. ...

Read more

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can ...

Read more

Five key points to consider for implementing a successful EDRM Project

The reason enterprise digital rights management (EDRM) finds increased adoption with the enterprise is the technology provides persistent data ...

Read more

SECUDE Announces New HALOCAD Plug-in for Bentley’s MicroStation

SECUDE, a leading data security provider specializing in security for SAP® software, are excited to announce a new HALOCAD Plug-in for Bentley’s ...

Read more