This is a question that we should be asking. The standardized encryption most organizations use today is clearly very flawed. One of the top methods of Ransomware Attack is going after a VPN connection. This is done, for the most part, through Social Engineering to get the encryption key. Are Cyber Attacks Really That Easy? […]
2013 – Data Collection Secrets Exposed When we founded Introspective as an Industrial IoT company, the cybersecurity issues around IoT were made evident by the 2013 NSA leaks. There were things we knew in the Telecom industry that, frankly, we thought were reserved for warranted wiretaps. As it turns out, they were not. Once those […]
Search for “data breaches” on your favorite search engine and you will find news of successful attacks involving hospitals, schools, major corporations, and even governments. The problem is rampant, happening on a weekly, sometimes daily, basis. It is clear nothing that is being done now to stop cyber attacks is very effective. Let’s explore how […]
Historically, there have been a number of objections to using a Vernam Cipher in the network. In this post, we discuss how using STOP technology removes these objections and makes it possible to use the strongest known encryption for network security. Technological advances like abundant bandwidth, storage capacity, and cheap, multi-core computing with clever, “out […]