Just as a User Interface (UI) is how a human user and software interact, an Application Programming Interface (API) is how a software component or system interacts with other software components or systems. It defines how other components or systems can use it. It describes the kinds of calls or […]

How to Integrate Security Into Your Application Infrastructure

Any executive accountable for enabling the efficient and effective governance of cybersecurity risks will invariably agree that during compliance and risk projects, manual processes waste time and resources. Automated platforms are available, but it is not uncommon to hear of frustration with the time, level of effort, and cost associated […]

Automation and Visibility to Your Compliance and Risk Management Program

The vast majority of cyber breaches leverage compromised credentials. Multi-factor (MFA) is a critical security measure for verifying a user’s identity, and yet many sensitive systems don’t use MFA. Why is that? At this year’s RSA Conference in San Franciso, I went about looking for an answer to that very […]

Identity as the New Perimeter

I want to introduce you to David. David is the Chief Information Security Officer for a sizeable financial institution. He is an educated career professional, a loving husband, and a devoted father. He takes his job as CISO very seriously. The responsibility of protecting his organization’s digital assets, including sensitive […]

A Security Patch for Your People

Security technology has not kept up with today’s accelerated move toward virtual infrastructure and disappearing network boundaries. Advanced hackers are quickly exploiting application vulnerabilities with fileless and memory-based attacks. A new security approach is needed to counter these sophisticated threats. Methods that do more than monitor the perimeter and that […]

Advanced Application Attacks Put Businesses at Risk

Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management

The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic

The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches

As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud

As data protection concerns rise and compliance regulation increases, the use of encrypted hard drives elevates right along with them. We’ve all seen them, and maybe you even use one. But why?  In an age of hyperconnectedness and mass cloud storage, are these little hardware devices old school technology? Most […]

Encrypted Hard Drives, Who Uses Them, and Why

Work From Home (WFH) Employees Across Business and Government Organizations of All Sizes Can Now Quickly, Easily and Securely Access Work Computer, and All Associated Data, from Home All Set-up, Configuration and Tech Support Also Provided Completely Free-of-Charge FORT COLLINS, Co. – March 18, 2020 – DH2i®, a leading provider of multi-platform Software […]

DH2i Launches DxOdyssey Work From Home Software – Completely Free ...

Cybersecurity studies show that it takes around six months for companies to notice a data breach. Now that’s an alarmingly long time to detect and respond to a cybersecurity incident.  By the time you spot the breach, you’d have lost thousands, if not millions, of your business-critical information — not […]

Is UK’s Cyber Essentials Even Working? Here’s What You Need ...