As regulators demand stricter security and privacy controls and increase penalties for noncompliance, entities are desperately seeking new ways to secure data.

The challenges to compliance will only grow as nationalities around the world enact their own data-protection laws and industries impose more stringent standards. …


In the cloud, cloud service providers (CSPs) manage the infrastructure they control — where organizational data and applications are stored — and perform the patching and updates so that the applications they use remain current.

These advantages are not inconsiderable, and executives are taking note. Among respondents to a recent…


When you store your valuable items in a safe deposit box, do you leave your key to that box with the bank? Of course not. Although you might trust your banker, you keep control of that key. Otherwise, if it fell into the wrong hands, you might lose your valuables.


Designing and implementing an IDS is not a trivial task, considering the numerous choices one faces during the process. Such systems require specialists who have a good overview over the entire application domain, and know how to configure each piece properly.

Not all business systems are created equal. Each is…


Where to place an intrusion detection system (IDS) is an important first question, but it’s far from the last decision you’ll make as you work to protect your enterprise from zero-day attacks like SolarWinds.

Once you’ve selected a location — on the network, on your devices, or, at a more…


The recent zero-day attacks on SolarWinds and more than 100 other businesses and nine government agencies spell it out as never before: every enterprise needs an intelligent, application-based intrusion detection system (IDS).

This valuable cybersecurity tool can prevent intruders from lurking in your system for days, weeks, or even months…


A doll that understands what children say and responds to them seemed, in 2015, like a great idea — unless you were a security analyst.

Unfortunately for Mattel, security analysts seem to have been left out of the conversation until the toymaker’s “Hello Barbie” had debuted on the market; security…


There’s an app for everything, and hackers and thieves are taking advantage. What are enterprises doing about it? Not enough.

Web and mobile application use has exploded in recent years as businesses have digitized and moved more of their operations to the cloud, and as the number of mobile devices…


The cloud computing paradigm has gained increasing attention from both industries and academia due to the almost-unlimited scaling potential through a lean and dynamic utilization of resources (ISC² Cloud Security Report, 2020). As identified by the National Institute of Standards and Technology (NIST), cloud computing possesses the following essential characteristics:

CYBERCRYPT

We help companies develop secure products

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store