How to Use Applied Data Science and Machine Learning for Cyber Security

Why has it become common practice to use applied data science and machine learning for cyber security? Hackers are using more and more sophisticated techniques, including artificial intelligence, to perform cyber attacks. Big data grows and changes at an increasingly rapid pace. Big data needs science in order to be useful. In today’s cyber security… Read more »

Security Issues with Working Remotely

As more businesses turn to remote work, many are asking themselves, “What security issues come with working remotely?” For most businesses, there are these top 4 security issues with working remotely: Phishing scams Unsecured endpoint devices Home office risks Network security Whether you’re new to remote work or have been telecommuting for years, it’s important… Read more »

Vulnerability Remediation Best Practices for Your Business

Vulnerability remediation best practices include: Understanding your existing infrastructure Having the right scanning tools Creating a system for prioritization Involving your whole team A growing number of business owners recognize the importance of reducing their IT vulnerabilities. You want to protect your assets, including every part of your IT infrastructure that has value to your… Read more »

Cybersecurity Maturity Model Certification (CMMC) for Defense Contractors

If you want to work with the Department of Defense, you may be asking, “What is Cybersecurity Maturity Model Certification (CMMC) for defense contractors?” Cybersecurity Maturity Model Certification is a new requirement for defense contractors to ensure they maintain an adequate level of cybersecurity to prevent criminals from accessing Controlled Unclassified Information (CUI). Share our… Read more »

Proactive vs Reactive Cyber Security for Your Business

When researching how to safeguard your organization’s sensitive data, you might stop to ask yourself, “What is proactive vs reactive cyber security?” Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive cyber security involves defending against attacks that have already happened. From company finances to business intelligence, customer information,… Read more »

How Is Entrust Innovating in R&D? Meet Our AI Research Scientist

Most people think of large companies, like Google and Apple, as the primary technology innovators in the U.S. But there are plenty of small businesses, like Entrust Solutions, leading the way and finding inventive methods of addressing technological challenges. So how do we compete and push innovation? Many technology breakthroughs past and present originated from… Read more »

Louisiana Vulnerability Management Best Practices

In the Information Age, personal information is at a premium. Companies use it as the basis of their business intelligence, giving them valuable insight into what they should produce, how they should market it, and much more. In many cases, we give our information away for free on social media or when using apps. Other… Read more »

New Orleans Technology Research and Development Opportunities

Technological innovation can come from almost anywhere. The next big idea could begin in a basement or a Fortune 500 company. When it comes to systematically producing new and innovative technology, however, research and development is critical. In addition to R&D from private companies, the U.S. government funds a significant amount of technology research and… Read more »

How to Reduce Cyber Security Risks

Today’s technology makes it easy for businesses to digitize, store, and use data, from customer information to business intelligence. Even the smallest businesses are likely to keep some information online, in the cloud, or on computers. Unfortunately, this comes with cyber security risks. As cyber crimes continue to advance in both quantity and quality, organizations… Read more »

3 Cloud Security Challenges and Risks to Protect Against

Cloud services are the foundation of modern business practices’ digital-first approach, and they are here to stay. According to Forrester, an analyst firm, cloud computing will more than double its global market value within a five-year time frame. It is expected to grow from $91 billion in 2015 to $191 billion by 2020. Despite this… Read more »