Data Protection


Secures Users and Their Organization’s Network Against Attacks that VPNs Can’t Protect Against By Jeff Steuart COVID-19 continues to drive work-from-home, and more organizations are striving to sustain and bolster security and compliance as a result.  Byos™’ introduction of its new μGateway™ (“micro-gateway”) gives organizations a new means to secure […]

Byos μGateway Brings New Security to Remote Networking, Enabling Zero ...


By Ezra Vazquez-D’Amico, Manager of GiveSafely.io The last four years have seen a growing awareness about the value of personal data and how exposed individuals are to nefarious forces, abuse, and hacks. With tech giants reaching multi-billion dollar valuations based on their monetization of personal data, coupled with high profile hacks and […]

How Data Decentralization, Encryption, and Security Can Enhance Trust in ...




“LiveAuctioneers, the online website which broadcasts live auctions selling antiques, art, and collectibles, has warned that user details have fallen into unauthorized hands following a security breach,” reported by Graham Cluley last week. A notification on LiveAuctioneers website states, “As of July 11th, 2020, our cybersecurity team has confirmed that […]

Online Auctions Site “Completely Failed Its Customers”


To be sure, contact tracing for infectious diseases is not new. This practice is vital for combating contagious viruses and has been around for a very long time, so why the controversy about it now? In bygone eras, if you were afflicted with an infectious disease, you would likely sit […]

Contact Tracing and Privacy


One of the notable perks for a journalist covering the security industry is the occasional opportunity to test and review security products and solutions. Over the last couple of weeks, I have had the chance to try three products from Kingston Technology and I am happy to provide Brilliance Security […]

Device Review – Kingston DataTraveler and Nucleum Devices



By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management


The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic



The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches


As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud