HOPZERO
  • Products
    • System Overview
    • Auditor
    • Recorder
    • Enforcer
    • Datasheets
  • Services
    • Exfiltration Audit
    • MSSPs
    • Training & Certs
  • Industries
    • Key Industry Overview
    • Healthcare
    • Financial Services
    • Pen Testing
    • Police
    • Military Security
    • SCADA
  • Videos
    • What is HOPZERO?
    • Data Center Case Study
    • Data Exfiltration Containment
    • Catching Phish
    • 9/11 Call to Cyber Defense
  • Whitepaper
  • About Us
    • Company
    • News
    • Blog
    • Partners
    • Events
    • Contact
  • LIVE EVENT
Select Page
Distance Per Network Hop Technical Report

Distance Per Network Hop Technical Report

by Peter Mullarkey | Jul 7, 2020 | Data Limits, Proximity Security, Server Security

This is a technical data analysis of physical distance per network hop done for Hopzero.Peter Mullarkey, PhD, Hopzero and RedRunGroupVersion 2.0 Motivation Having a basic understanding of the physical distance between network hops can provide insight to a company’s...
What Does HOP Count Mean? (and Other Important HOP Questions Answered)

What Does HOP Count Mean? (and Other Important HOP Questions Answered)

by Bill Alderson | Jan 14, 2020 | Data Limits, Network Security, Proximity Security

If you’re involved in IT, you’ve probably heard of HOPs. But you might have asked yourself: What does HOP count mean? And why should you care?

Keeping Data on a Short Leash to Avoid Breaches

Keeping Data on a Short Leash to Avoid Breaches

by Bill Alderson | May 22, 2019 | Data Breach, Data Limits

Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise? Another dog? Dogs...
How to Avoid the ‘Mousetrap Syndrome’ of Network Security

How to Avoid the ‘Mousetrap Syndrome’ of Network Security

by Jim Rounsville | Mar 16, 2018 | Data Breach, Data Limits, Network Security

How do we protect our data? It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams. We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like...
“It’s Not You; It’s Me”: Network Protection From the Inside-Out

“It’s Not You; It’s Me”: Network Protection From the Inside-Out

by Ben Haley | Feb 20, 2018 | Data Breach, Data Limits

Every enterprise network uses firewalls to restrict incoming traffic. These firewalls are amazing pieces of technology, building a powerful wall to keep intruders out — but all the defenses face outward.The soft spots — those areas most vulnerable — come from us,...
What the Antiquated Bank ATM Can Teach Us About Database Security

What the Antiquated Bank ATM Can Teach Us About Database Security

by Bill Alderson | Feb 7, 2018 | Data Limits, Network Security, Proximity Security

The antiquated ATM is an instructive metaphor for understanding the relationship between the web and your organization’s database server.

« Older Entries

Recent Posts

  • Law Enforcement Case Study
  • Distance Per Network Hop Technical Report
  • What Does HOP Count Mean? (and Other Important HOP Questions Answered)
  • 4 Cyber Security Trends for 2020 to Keep an Eye On
  • Keeping Data on a Short Leash to Avoid Breaches

Recent Comments

    Archives

    • November 2020
    • July 2020
    • January 2020
    • May 2019
    • April 2019
    • March 2019
    • December 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • August 2017

    Categories

    • Cyber Defense
    • Cyber Protection
    • Cybersecurity
    • Data Breach
    • Data Limits
    • Industry Data Exfiltration
    • Network Security
    • News
    • Phishing
    • Press Release
    • Proximity Security
    • Server Security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    GET STARTED

    • Data Exfiltration Prevention
    • How to Prevent Phishing
    • Reduce Attack Surface WP
    • For MSSPs
    • 15-Minute Assessment

    Product Details

    • What is HOPZERO?
    • Auditor
    • Recorder
    • Enforcer
    • Videos
    • FAQ

    Industry Solutions

    • Overview
    • Financial Services
    • Healthcare
    • Military Security
    • SCADA
    +1 833-467-9376

    [email protected]

    copyright 2020 HOPZERO. All rights reserved.
    Privacy Policy | Terms of Service