Cybersecurity and threat Intelligence expert says businesses can protect data simply and affordably By T.J. Minichillo. As the pandemic reshapes where and how we work, small and mid-sized businesses (SMBs) through enterprise-level face incredibly tough decisions around business continuity and staying afloat financially. Cyber attacks may seem like a distant worry, but studies show that bad actors are taking even…
Sales Leader “Rocky” McMurray Joins to Lead Exceptional Experience for Growing Customer Base at Breakthrough Data Security Technology Company Las Vegas, NV — July 1, 2020 — Keyavi Data, a security technology company that infuses protection directly into data itself, today announced that Rocky McMurray has joined the company as Executive Vice President of Sales. McMurray is a cybersecurity and technology executive with over 20…
Company infuses protection into data itself, allowing owners to control access anytime, anywhere, for as long as they want Las Vegas— April 9, 2020 — Keyavi Data, a data security technology company that embeds protection directly into data itself, today announced that the company’s cybersecurity product is immediately available to enterprise customers worldwide. This new data protection breakthrough…
Company to solve the world’s data security problem by embedding intelligence into data so it will self-protect even after it leaves the possession of its owner Las Vegas— March 24, 2020 — Keyavi Data, a data security technology company that embeds protection directly into the data, today announced the public launch of the company and its leadership…
By Elliot Lewis. Your security strategy need to be NIMBLE, ELASTIC and FLEXIBLE or you will not be able to deal with the inevitable security incidents that will arise despite your best laid plans and designs. No environment stays static over time – and therefore no threat model is a constant model. Any security architecture, and the…
By Elliot Lewis. You can keep your security at a “state of the art’ level despite the ever-changing and advancing world of IT solutions by using the techniques of Mitigation Effectiveness analysis. In my last article, about the Principle of Imminent Obsolescence, I discussed how any given security mitigation can, and will, eventually go obsolete based…
By Elliot Lewis. WHAT IS IMMINENT OBSOLESCENCE? If you are running a business in today’s world of almost constant technology change—your security mitigations will eventually become more ineffectual for you over time unless you are watching for Imminent Obsolescence. Technology is constantly evolving—and security tools need to constantly evolve with it. When vendors engineer their solutions—those solutions…