Tag: Data Centric Security

21
Oct

5 Ways to Defend Against Supply Chain Cyberattacks

Supply chains make ideal targets for cybercriminals since they hold sensitive data, often have large attack surfaces and are mostly unprotected. Here are five ways that organizations can defend against supply chain cyberattacks.

14
Oct

September 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

September 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

28
Sep

The Implications of Big Tech’s Meeting With Biden

It’s no secret that cybersecurity breaches are a major concern for businesses across all industries, and governments are starting to take notice. On August 25, 2021, the U.S government met with business leaders from some of the tech sector’s giants, including Microsoft, IBM, Apple, and Google.

10
Sep

8 Benefits of Implementing a Zero Trust Architecture

Zero Trust is gaining momentum. Organizations implementing Zero Trust architecture witness fewer data breaches. There are several benefits when you implement a Zero Trust Architecture, some are listed in the blog post.

8
Sep

August 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

August 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

24
Aug

7 Strategies to Keep Business Data Secure

Cyberattacks are on the rise. The growing number of internet-connected devices and the value of business data means cybercriminals have more to gain than ever from breaking into a company’s network. Here are the seven most important cybersecurity tactics for a business to use. Employing them will help keep company data secure.

11
Aug

Why the New Executive Order will result in wider rollout of Zero Trust Adoption

The Biden administration’s executive order on Improving the Nation’s Cybersecurity names zero trust as an essential component in hardening federal agencies against internal and external threats to national security. Here’s why this move should prove consequential in the wider rollout of zero trust infrastructure.

10
Aug

July 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

July 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

4
Aug

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access sensitive data. Learn more about how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.

26
Jul

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business.