Blog

Studying mathematics educational background. Books pile, pencils, scissors, magnifying glass and apple against classroom blackboard with chalk writing of sums. Back to school, research concept
When It Comes to DIKW, It’s Never Easy to Get Smart

Posted on January 15 | Posted in cybersecurity network security

The pyramid of Data-Information-Knowledge-Wisdom (DIKW) has become a critical element for defending against network contamination and sabotage.

Read More
The Simple USB Flash Drive is Not So Simple After All

Posted on January 1 | Posted in cybersecurity data breach flash drive breaches

Widespread are the daily breaches in which authorized personnel thoughtlessly charge or sync their personal mobile device through a USB port at work.

Read More
Man holding a big sack of money
The Future of Cybersecurity Spending

Posted on December 18 | Posted in cybersecurity network security

According to a report released by data-security company Varonis, cybersecurity budgets have increased by 141 percent between 2010 and 2018.

Read More
Sao Francisco Xavier fortress, aka Cheese Castle, built in the fifteenth century on the Cheese cliff, ancestral place of Draganes tribe worship, located in city of Oporto extreme southern, facing the Atlantic Ocean, seeing his drawbridge.
The Physical Side of Cybersecurity

Posted on December 4 | Posted in cybersecurity

In most organizations, the obvious, physical points of access into data and information systems – namely, USB port – are simply left unguarded.

Read More
businessman nervously facing an obstacle challenge
The Urgent Gap in Cybersecurity

Posted on November 20 | Posted in cybersecurity

So much action and activity is seen in cybersecurity today that the dramatic increase in spending for it has been described as climbing a mountain.

Read More
Nuclear Explosion and waves in sky
Safeguards Versus “The Perfect Weapon”

Posted on November 6 | Posted in flash drive breaches

The mystery of cyber warfare is that many of the most impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.

Read More
mask in hand. halloween concept
Why Should the Obvious be Strange?

Posted on October 16 | Posted in flash drive breaches port locks

Chilling research has demonstrated that even the best-intentioned workers don’t hesitate to connect personal devices to the data system at work.

Read More
Latch with padlock on door in India
The Greatest Unguarded Threat to Network Security

Posted on October 2 | Posted in network security

The data ports and cable connections of data and IT networks offer the easiest, most numerous points of access for data theft, compromise, and infection.

Read More
Cruise Ship Lifebuoy Lifering. Life Saving Ring. Sea Travel Safety
Uncompromising Urgency

Posted on September 18 | Posted in cybersecurity

Most data security solutions depend on responding to threats after they occur. A rapid-reaction force doesn’t replace the need for a perimeter of security.

Read More
Curious man with eyeglasses looking through a jalousie. Themes curiousity, surveillance or eyesight.
Hiding in Plain Sight – the Essentials of Cybersecurity

Posted on September 4 | Posted in cybersecurity

What’s missing in most organizations is systematic protection for the physical points of access to their data network and information systems.

Read More