Blog

Studying mathematics educational background. Books pile, pencils, scissors, magnifying glass and apple against classroom blackboard with chalk writing of sums. Back to school, research concept
When It Comes to DIKW, It’s Never Easy to Get Smart

Posted on January 15 | Posted in cybersecurity network security

The pyramid of Data-Information-Knowledge-Wisdom (DIKW) was identified more than 40 years ago, but that pyramid is as steep now as it was then.

Read More
The Simple USB Flash Drive is Not So Simple After All

Posted on January 1 | Posted in cybersecurity data breach flash drive breaches

It’s not just the idea of USB flash drives infecting computers and networks that is cause for alarm, there is also of sensitive data loss.

Read More
Man holding a big sack of money
The Future of Cybersecurity Spending

Posted on December 18 | Posted in cybersecurity network security

According to a report released earlier this year by data-security company Varonis, cybersecurity budgets have increased by 141 percent between 2010 and 2018.

Read More
Sao Francisco Xavier fortress, aka Cheese Castle, built in the fifteenth century on the Cheese cliff, ancestral place of Draganes tribe worship, located in city of Oporto extreme southern, facing the Atlantic Ocean, seeing his drawbridge.
The Physical Side of Cybersecurity

Posted on December 4 | Posted in cybersecurity

When all the cyber-defense attention goes online, it’s like building a moat around a castle and leaving the drawbridge down. It doesn’t make sense. We’ll tell you why.

Read More
businessman nervously facing an obstacle challenge
The Urgent Gap in Cybersecurity

Posted on November 20 | Posted in cybersecurity

Global cybersecurity spending will reach $170 billion in the coming year, but there is an alarming gap in our protection against virtual attacks and physical ones.

Read More
Nuclear Explosion and waves in sky
Safeguards Versus “The Perfect Weapon”

Posted on November 6 | Posted in flash drive breaches

The mystery within the mystery of cyber warfare is that many of the most significant and impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.

Read More
mask in hand. halloween concept
Why Should the Obvious be Strange?

Posted on October 16 | Posted in port locks

Not only can the physical points of data network security be attacked, situated as they are in full view of every associate and visitor, but they are also open invitations to unintentional contamination.

Read More
Latch with padlock on door in India
The Greatest Unguarded Threat to Network Security

Posted on October 2 | Posted in network security

The data ports and cable connections of data and IT networks offer the easiest, most numerous points of access for data theft, compromise, and infection.

Read More
Cruise Ship Lifebuoy Lifering. Life Saving Ring. Sea Travel Safety
Uncompromising Urgency

Posted on September 18 | Posted in cybersecurity

The very existence of the term, “Day Zero,” points to the uncompromising urgency of developing IT cyber safety and data security solutions that protect your company.

Read More
Curious man with eyeglasses looking through a jalousie. Themes curiousity, surveillance or eyesight.
Hiding in Plain Sight – the Essentials of Cybersecurity

Posted on September 4 | Posted in cybersecurity

Today, data is the new, universal currency. And the means of protecting it are far from mature.

Read More