If there’s one thing recent cyberattacks on compromised government personnel data should have taught us, it’s that state-sponsored cybercrime is far more than just a bogeyman story made up to frighten IT professionals. One recent example is where Chinese hackers... Read More
Meet Cryptzone at SPTechCon, AFCEATechNet or Cyber Security Summit for Access Control and Info Security Strategies and Solutions
Need to protect critical services, applications and content from internal and external threats? Then meet with Cryptzone as we showcase our technology at three upcoming events in Augusta, Georgia, Boston and New York.
The term monoculture originates in agriculture, where it describes the practice of cultivating a single, homogenous crop in a given geographical area. The main problem with this approach is that if a disease breaks out to which the crop has... Read More
Today we are excited to welcome Leo Taddeo former Special Agent in Charge, of the Special Operations/Cyber Division of the FBI’s New York Office—to Cryptzone’s Executive Team. As Chief Security Officer, Leo is responsible for analyzing the cybersecurity market, providing... Read More
Today, we are excited to announce that Cryptzone has joined the Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within cloud computing, and to provide education on... Read More
We’re pleased to share the news that the U.S. Army Network Enterprise Technology Command (NETCOM) has issued a new Certificate of Networthiness (CoN) for Cryptzone’s Compliance Sheriff™, empowering Army IT Professionals to implement the content governance solution in their IT... Read More
Based in Charlotte, NC, Cogentrix is an operator and manager of power plants with a long record of successfully acquiring, developing, constructing, operating, improving and divesting power generation assets. Consistent with its engineering origins and culture, Cogentrix maintains a disciplined... Read More
Last week I hosted a webinar on The Software Defined Perimeter: Creating an Invisible Infrastructure where I looked at the traditional perimeter model for security and whether or not it’s still a viable method of threat protection.
Sunday evening the power went out. There were tremendous thunderstorms in the area, which, as I began to think more about it (in the dark) was a comforting factor. First things first though, I had to tell everyone not to... Read More