HOPZERO
  • Products
    • System Overview
    • Auditor
    • Recorder
    • Enforcer
    • Datasheets
  • Services
    • Exfiltration Audit
    • MSSPs
    • Training & Certs
  • Industries
    • Key Industry Overview
    • Healthcare
    • Financial Services
    • Pen Testing
    • Police
    • Military Security
    • SCADA
  • Videos
    • What is HOPZERO?
    • Data Center Case Study
    • Data Exfiltration Containment
    • Catching Phish
    • 9/11 Call to Cyber Defense
  • Whitepaper
  • About Us
    • Company
    • News
    • Blog
    • Partners
    • Events
    • Contact
  • LIVE EVENT
Select Page
4 Cyber Security Trends for 2020 to Keep an Eye On

4 Cyber Security Trends for 2020 to Keep an Eye On

by Bill Alderson | Jan 8, 2020 | Cyber Defense, Cybersecurity, Data Breach, Phishing

While it’s nearly impossible to predict the future, here are four key cyber security trends for 2020 we think every infosec professional should keep tabs on.

Keeping Data on a Short Leash to Avoid Breaches

Keeping Data on a Short Leash to Avoid Breaches

by Bill Alderson | May 22, 2019 | Data Breach, Data Limits

Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise? Another dog? Dogs...
[VIDEO] Everything You Always Wanted to Know About HOP Counts in Networking

[VIDEO] Everything You Always Wanted to Know About HOP Counts in Networking

by Bill Alderson | Aug 3, 2018 | Data Breach, Network Security, Proximity Security

A short animation laying out how hops and networking relate to each other and give you the intel needed to achieve visibility of your most precious data.

How to Avoid the ‘Mousetrap Syndrome’ of Network Security

How to Avoid the ‘Mousetrap Syndrome’ of Network Security

by Jim Rounsville | Mar 16, 2018 | Data Breach, Data Limits, Network Security

How do we protect our data? It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams. We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like...
“It’s Not You; It’s Me”: Network Protection From the Inside-Out

“It’s Not You; It’s Me”: Network Protection From the Inside-Out

by Ben Haley | Feb 20, 2018 | Data Breach, Data Limits

Every enterprise network uses firewalls to restrict incoming traffic. These firewalls are amazing pieces of technology, building a powerful wall to keep intruders out — but all the defenses face outward.The soft spots — those areas most vulnerable — come from us,...
Is Your Internet Browser Making You Vulnerable to a Hack?

Is Your Internet Browser Making You Vulnerable to a Hack?

by Ben Haley | Jan 25, 2018 | Data Breach, Network Security

Do you or others in your organization use Google Chrome or Mozilla Firefox browser extensions? Many of us do. Often they have incredibly-useful features, such as ad-blocking, advanced searching, reducing page-load times, and much more. But did you ever wonder if they...
« Older Entries

Recent Posts

  • Law Enforcement Case Study
  • Distance Per Network Hop Technical Report
  • What Does HOP Count Mean? (and Other Important HOP Questions Answered)
  • 4 Cyber Security Trends for 2020 to Keep an Eye On
  • Keeping Data on a Short Leash to Avoid Breaches

Recent Comments

    Archives

    • November 2020
    • July 2020
    • January 2020
    • May 2019
    • April 2019
    • March 2019
    • December 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • August 2017

    Categories

    • Cyber Defense
    • Cyber Protection
    • Cybersecurity
    • Data Breach
    • Data Limits
    • Industry Data Exfiltration
    • Network Security
    • News
    • Phishing
    • Press Release
    • Proximity Security
    • Server Security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    GET STARTED

    • Data Exfiltration Prevention
    • How to Prevent Phishing
    • Reduce Attack Surface WP
    • For MSSPs
    • 15-Minute Assessment

    Product Details

    • What is HOPZERO?
    • Auditor
    • Recorder
    • Enforcer
    • Videos
    • FAQ

    Industry Solutions

    • Overview
    • Financial Services
    • Healthcare
    • Military Security
    • SCADA
    +1 833-467-9376

    [email protected]

    copyright 2020 HOPZERO. All rights reserved.
    Privacy Policy | Terms of Service