Tag: Data Centric Security

8
Sep

August 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

August 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

24
Aug

7 Strategies to Keep Business Data Secure

Cyberattacks are on the rise. The growing number of internet-connected devices and the value of business data means cybercriminals have more to gain than ever from breaking into a company’s network. Here are the seven most important cybersecurity tactics for a business to use. Employing them will help keep company data secure.

11
Aug

Why the New Executive Order will result in wider rollout of Zero Trust Adoption

The Biden administration’s executive order on Improving the Nation’s Cybersecurity names zero trust as an essential component in hardening federal agencies against internal and external threats to national security. Here’s why this move should prove consequential in the wider rollout of zero trust infrastructure.

10
Aug

July 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

July 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

4
Aug

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access sensitive data. Learn more about how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.

26
Jul

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business.

15
Jul

June 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

June 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

14
Jul

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can take to keep their sensitive supply chain data safe.

9
Jul

Five key points to consider for implementing a successful EDRM Project

The reason enterprise digital rights management (EDRM) finds increased adoption with the enterprise is the technology provides persistent data protection wherever the data travels or exchanged between employees, partners, vendors, and suppliers across the complex supply chains.

28
Jun

The Colonial Pipeline Ransomware Attack: The Fallout and Its Implications

This blog was written by an independent guest blogger. The Colonial Pipeline ransomware attack is one of the most recent and high-profile cybersecurity events affecting a public or private organization. However, what’s most frightening about it is the implications it has for the future of digital technologies.