Category: Introspective Blog

  • Examining the Seven Tenets of Zero Trust

    Our prior post entitled “What is Zero Trust, Anyway?” discussed a bit about how Zero Trust is defined at a high level and touched on the Seven Tenets of Zero Trust. Today, let’s take a deeper dive into those tenets and learn more. We’ll expand on what each tenet means with regard to a network. […]

  • What is Zero Trust, Anyway?

    Governments, scholars, and industry organizations have been trying to define Zero Trust for nearly three decades. In 1994, the term was first used by Stephen Paul Marsh at the University of Stirling in Scotland in his doctoral thesis on computer security. In 2018, NIST began working on the SP 800-207, with an initial public draft […]

  • Why Do We Need Encryption Standards?

    This is a question that we should be asking. The standardized encryption most organizations use today is clearly very flawed. One of the top methods of Ransomware Attack is going after a VPN connection. This is done, for the most part, through Social Engineering to get the encryption key. Are Cyber Attacks Really That Easy? […]

  • Proactive Cybersecurity is Better Than Reactive

    2013 – Data Collection Secrets Exposed When we founded Introspective as an Industrial IoT company, the cybersecurity issues around IoT were made evident by the 2013 NSA leaks. There were things we knew in the Telecom industry that, frankly, we thought were reserved for warranted wiretaps. As it turns out, they were not. Once those […]

  • Data Theft 101

    Search for “data breaches” on your favorite search engine and you will find news of successful attacks involving hospitals, schools, major corporations, and even governments. The problem is rampant, happening on a weekly, sometimes daily, basis. It is clear nothing that is being done now to stop cyber attacks is very effective. Let’s explore how […]

  • Removing Objections to the Vernam Cipher

    Historically, there have been a number of objections to using a Vernam Cipher in the network. In this post, we discuss how using STOP technology removes these objections and makes it possible to use the strongest known encryption for network security. Technological advances like abundant bandwidth, storage capacity, and cheap, multi-core computing with clever, “out […]