Blog


  • One problem at the center of it all – data cannot protect itself

    Cybersecurity is one of the top concerns for all individuals, companies, governments, and organizations today because – despite all of the tools, products and services available today for cyber – data is still being lost at a constant and every increasing rate.  The crisis of data loss is simply non-stop. Every day, we see the…


  • CISOs no longer have to think about trying to contain data!

    In this HotSeatTV interview, our CEO Elliot Lewis explains to Gary Miliefsky how data itself has a new level of intelligence & security because it can now think for itself and self-protect. Watch:


  • Keyavi’s silver bullet for ransomware’s golden goose

    Lock and Keys

    It’s every CEO’s worst nightmare. You arrive at the office early one morning to find every computer is frozen, your business data is locked on every computer screen. There’s a warning demanding a huge amount of money to restore your data, while a timer counts down the minutes until every shred of information is going…


  • How to be a hero in your digital transformation journey

    Hero of Digital Transformation

    by T.J. Minichillo [This is the fourth of a 4-part series about what it means to be truly resilient in the cyber security industry] If your journey of 1,000 digital transformation miles begins with a single step, here’s step one: recognize that digital transformation isn’t just about technology. It’s about making business processes and workflows…


  • What would a truly cyber resilient security world look like?

    by T.J. Minichillo [This is the third of a 4-part series about what it means to be truly resilient in the cyber security industry] In my previous post, I explained why enabling business growth is the essence of resilience and why secure, uninterrupted data flows are the heart and soul of every resilient company. Data…


  • Elegance and simplicity: the essence of cybersec resilience

    Hexes

    by T.J. Minichillo  [This is the second of a 4-part series about what it means to be truly resilient in the cyber security industry]  In my previous post, I challenged every infosec professional attending RSA’s virtual conference this week to dispel their preconceived notions of “resilience” by opening their minds to a massive new cybersecurity paradigm…


  • Keyavi wins big at the Global InfoSec Awards during RSA 2021: So what does that mean for you?

    by T.J. Minichillo  [This is the first of a 4-part series about what it means to be truly resilient in the cyber security industry]  As RSA’s 2021 virtual conference got underway today, Keyavi Data received top honors in three categories at the 9th annual Global Infosec Awards: Cybersecurity Startup of the Year, Hot Company in Data Security and Self-protecting Data…


  • Top 2021 cybersecurity trends and threat predictions

    2021 Cybersecurity Wordcloud

    By T.J. Minichillo and Celine Gravelines Cybersecurity, like life itself, underwent cataclysmic changes as COVID-19 spread around the world during 2020. Millions of employees everywhere were suddenly working from home remotely, stretching network perimeters far beyond their organization’s headquarters. To stay afloat amid the economic downturn while supporting their distributed workforce, many organizations had to…


  • Top 5 tips for staying ahead of cyber criminals during heightened COVID-19 workforce attacks

    Secure Network

    Cybersecurity and threat Intelligence expert says businesses can protect data simply and affordably  By T.J. Minichillo. As the pandemic reshapes where and how we work, small and mid-sized businesses (SMBs) through enterprise-level face incredibly tough decisions around business continuity and staying afloat financially.  Cyber attacks may seem like a distant worry, but studies show that bad actors are taking even…


  • Rigidity is detrimental to your security architecture: the principle of nimble & elastic flexibility

    Computer Security Breach Abstract

    By Elliot Lewis. Your security strategy need to be NIMBLE, ELASTIC and FLEXIBLE or you will not be able to deal with the inevitable security incidents that will arise despite your best laid plans and designs. No environment stays static over time – and therefore no threat model is a constant model. Any security architecture, and the…