The Biden administration’s executive order on Improving the Nation’s Cybersecurity names zero trust as an essential component in hardening federal agencies against internal and external threats to national security. Here’s why this move should prove consequential in the wider rollout of zero trust infrastructure.
Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access sensitive data. Learn more about how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.
This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business.
Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can take to keep their sensitive supply chain data safe.
The reason enterprise digital rights management (EDRM) finds increased adoption with the enterprise is the technology provides persistent data protection wherever the data travels or exchanged between employees, partners, vendors, and suppliers across the complex supply chains.
This blog was written by an independent guest blogger. The Colonial Pipeline ransomware attack is one of the most recent and high-profile cybersecurity events affecting a public or private organization. However, what’s most frightening about it is the implications it has for the future of digital technologies.
This blog was written by an independent guest blogger. Security-first, as the name implies, means considering cybersecurity at the center of every business decision. Being security-first is about restructuring your thinking, so cybersecurity is no longer an afterthought.
Read how the recent corona pandemic has pushed us into a forced home office and how to deal with it through a structured & goal-oriented approach.
The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?
PII of around 500 million(!) guests at Marriott hotels has been compromised. The cause of this is due to unauthorized access within its network since 2014. Could this have been averted as early as 2010 when it switched to SAP ERP?