Blog categories

May 8, 2018 |
Papers, Case Studies,  |
cuzimbob

Syberdash solves a problem that most people don't realize they have; tracking cybersecurity requirements are nearly impossible and thus most projects rely on their cybersecurity analysts to just keep track of everything and then resolve issues as they are found. This reactive approach to cybersecurity doesn't have to be the only way; Syberdash allows an organization to be proactive and decide which discrete requirements they will actually implement long before an audit or red team test.

May 3, 2018 |
Case Studies,  |
cuzimbob

How much does your company spend per user per year on IT services?  One company cut their costs almost in half by moving to the cloud.  Almost all of the software and services you use today are available in the cloud; and they come with a better availability time and better security than you can provide for your self.  In addition to better security your company gets to transfer your security risk to these cloud based organizations thus insulating you from some, if not all, of your own security risks.

Mar 16, 2018 |
Papers, Case Studies,  |
cuzimbob

When an S/MIME or PKE encrypted email is sent to someone who uses G Suite Enterprise and they use a desktop client (e.g. MS Outlook) end-to-end encrypted emails will be stored in plain text allowing anyone with access to the machine to read the contents of the previously encrypted email.