Yearly Archives: 2020



Any executive accountable for enabling the efficient and effective governance of cybersecurity risks will invariably agree that during compliance and risk projects, manual processes waste time and resources. Automated platforms are available, but it is not uncommon to hear of frustration with the time, level of effort, and cost associated […]

Automation and Visibility to Your Compliance and Risk Management Program




I want to introduce you to David. David is the Chief Information Security Officer for a sizeable financial institution. He is an educated career professional, a loving husband, and a devoted father. He takes his job as CISO very seriously. The responsibility of protecting his organization’s digital assets, including sensitive […]

A Security Patch for Your People


Security technology has not kept up with today’s accelerated move toward virtual infrastructure and disappearing network boundaries. Advanced hackers are quickly exploiting application vulnerabilities with fileless and memory-based attacks. A new security approach is needed to counter these sophisticated threats. Methods that do more than monitor the perimeter and that […]

Advanced Application Attacks Put Businesses at Risk


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management



The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic


The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches


As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud




Work From Home (WFH) Employees Across Business and Government Organizations of All Sizes Can Now Quickly, Easily and Securely Access Work Computer, and All Associated Data, from Home All Set-up, Configuration and Tech Support Also Provided Completely Free-of-Charge FORT COLLINS, Co. – March 18, 2020 – DH2i®, a leading provider of multi-platform Software […]

DH2i Launches DxOdyssey Work From Home Software – Completely Free ...