Skip to the content

Cybersecurity News and Articles

Encryption is only the beginning of Protection

As with most breaches this one began with the target company having a weak security position and utilizing products that were only partial solutions to a critical problem.  Encrypting their databases would normally protect sensitive data from exposure if the hack is simple, but more complex hacks involving the ability to acquire administrator level access require a more diverse and encompassing level of security.

SQrazorLoc, our database protection product, is such a solution because it doesn't stop at merely protecting the database, it also protects what applications can then access the database through it's secure gateway.

Individual Autonomy will become ever more important

As more and more groups look to use information extracted from the internet about individuals, the phrase "Individual Autonomy" will have ever deeper meaning.  At present the information the IMF is proposing to use in the setting of credit scores is freely available thanks to data mining at all levels of an individual's virtual life.  From browsing histories to online purchases, from online gaming to tweets on twitter, all of these experiences are mined to their maximum for information about the individuals involved.  And all of this is done with no control by the individual who's data is being mined much less any knowledge that it even occurs.

Who do you Trust with your Data?

At present every time you browse the internet your actions, the sites you visit, the products you buy, the activities you participate in online, almost every you do is tracked, logged, and processed for value.  As people become ever more aware of this fact of their virtual lives they will take ever greater action to stop it especially as it begins to affect their normal lives outside the internet.  This is why CYPHYX has a primary goal of giving control back to the individual.  We call it "Individual Autonomy", but really it is how things always should have been.  Between Government and the Big Tech companies, there really hasn't been much protection for the individual, until now.  CYPHYX plans to change that and give control back to the individual.

Compromised passwords are only part of what's wrong with Cybersecurity for the consumer

A solution that combines both data protection and authentication is what Internet of Things devices such as cameras, lights, and sensors need to fully secure their use.  Half measures such as digital certificates and user changeable passwords are only the equivalent of a band-aid stuck over a serious wound.

Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses

While insurance can help to alleviate some of the financials costs, it cannot repair the damage done to reputation or customer trust.  The better solution is to implement a system of prevention, protection, and detection along with awareness for employees.  These steps will help to reduce and eliminate in most cases the reason breaches occur.

MySQL Design Flaw Allows Malicious Servers to Steal Files from Clients

SQrazorLoc ensures that your application only connects to known databases and provides reporting data that shows what applications are connecting to which databases.

Another huge database exposed millions of call logs and SMS text messages

If instead that had implemented complete security on the database, encrypted the data and set some level of authentication to access the data then it wouldn't have happened.  The problem here is maintaining a process to ensure that lapses in security do not happen.

Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

With the CYPHYX patented technology called DARE, Dynamic and Random Encryption, you can have one time pads now instead of having to wait for Quantum Key Distribution later.

The Shocking Cost of a Data Breach to Small and Medium Sized Businesses

For the current Cybersecurity market, Detection seems to be the go to solution.  Only problem with products being so focused on detection is that once they detect the breach or intrusion then the costs really begin to escalate for detection.  With CYPHYX products prevention is the primary focus and not detection because prevention is far more cost effective than mere detection. 

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"


12870 Trade Way Four
Suite 107  #665
Bonita Springs, Fl. 34135