top of page

LATEST
Search


Richard Blech
Dec 20, 2021
Data Security for the New Normal-The Hybrid Workplace
As the world tries to emerge from the worldwide pandemic and the hybrid workplace surfaces as a permanent fixture for many organizations,...


Richard Blech
Dec 13, 2021
Malware Hiding in Encrypted Traffic Becomes an Increasing Threat
The sharp increase in the use of encryption has changed the cybersecurity landscape. Organizations are rightfully ramping up their use of...


Richard Blech
Nov 15, 2021
The Continuous Threat of Botnets
Botnets are a pervasive type of cyberthreat that show no signs of waning. Threat actors are continuing to use these sophisticated types...


Richard Blech
Nov 1, 2021
Deter Cyber Attacks by Thinking Like a Threat Actor
There can be a wide gap between the cyber threat actor’s capability for launching a cyber attack and infiltrating an organization’s IT...


Richard Blech
Aug 23, 2021
Zero-Day Attacks: A Proactive-Common Sense Approach
Zero-day attacks can present a unique challenge to cybersecurity experts. How does an organization protect itself against unknown...

Richard Blech
Jun 8, 2021
Meeting Today's Challenges with EBP - Encrypted Broadcast Protocol
Moving gigabytes, terabytes and even petabytes of data have become a matter of routine for organizations across all industries. And the...
bottom of page