THE MISSING KEY – 3rd PARTY VALIDATION OF FIRMWARE AND SOFTWARE UPDATES
Solutions to extend security to installed low-level code and high-level applications is a fundamental requirement for IT ecosystem health. Unfortunately, the solutions for validating the authenticity of firmware and software updates are failing to keep pace with two hyper evolving adversaries. The first is explosive growth of the threat surface that is unfortunately not maintained […]
Read MoreSoftware Supply Chain Vulnerability
Globally the digital transformation is in its infancy. The number of connected devices and our reliance on software will only continue to grow. While this has innumerable benefits for society and governments, it brings with it challenges that require proactive thought and action. The bad actors, whether they are nation-state actors, organized groups, or lone […]
Read MoreThe Blockchain Solution for Data Integrity
When considering blockchain technology for data integrity—particularly in the realm of log file immutability—there are several critical barriers. Without addressing each of these potential barriers the solution will ultimately fail, either outright or by lack of adoption, because each one can render the solution unusable, unscalable, or both. Performance – Application log files will often […]
Read MoreRethinking Data Integrity
Data integrity is one of the most underappreciated components of cybersecurity. In fact, I can confidently say that not many individuals would even characterize data integrity as a component of cybersecurity. Information lifecycle management – sure, but even there it is often relegated to an after thought or an ancillary part of a data management […]
Read MoreData Integrity for IoT
| Material Challenge in a Digital World | The Internet of Things – IoT as it is widely known – is changing the way we live and work. There are literally billions of connected devices transmitting trillions of data points over both wireless internet and cellular networks. This shift is redefining what we know of […]
Read MoreWe Win or Lose as a Team
| A Path to Team Success in Virtual Times | “We win or lose as a team,” said Andy Babcock, COO of Covax Data. Our company is built of a team scattered around the United States in a fully remote workforce. Our team has grown tremendously over the last year to create our flagship product, […]
Read MoreData Security: Understanding the Threat Part 6
| 2020 The Year of Living Dangerously | This multi-part series is designed to provide a deeper understanding of the threats that your organization and its data face. As we speak to customers and partners, we see gaps in understanding when it comes to data security. Our goal is to educate our readers to understand […]
Read MoreSecurity Alert: SolarWinds Incident Exposes Broader Data Threat
| What do you do when the solution becomes the problem? | As part of our Understanding the Threat series, we had intended to take a deeper dive into some of the cascading failures that led to the largest data breaches in history. Breaches such as Starwood, Equifax, and Adobe were not singular failures but […]
Read MoreData Security: Understanding the Threat Part 5
| Threat Mitigation: Log File Immutability | This multi-part series is designed to provide a deeper understanding of the threats that your organization and its data face. As we speak to customers and partners, we see gaps in understanding when it comes to data security. Our goal is to educate our readers to understand the […]
Read MoreCovax Polymer is a Must for Legal Firms
| Love Your Lawyers—Give Them Covax Data! | One of William Shakespeare’s most famous creations is the line, “let’s kill all the lawyers,” from the play Henry VI. Thankfully for the legal profession, such butchering never occurred and, while lawyers occasionally suffer satirical criticisms and stereotyping, at Covax Data, we want to recognize “Love Your Lawyer […]
Read More