SECROM UC Mobility Solution
Increased demand for mobility, work from home, and international business travel amplifies concerns among the CIOs about security of information. Compounding the issue are the increased intensity, scale, and sophistication of cyber attacks targeting the U.S. companies...
ABSTRACT
The National Counterintelligence Strategy of the United States of America 2016 (Strategy) was developed in accordance with the Counterintelligence Enhancement Act of 2002 (Pub.L. No. 107-306, 116 Stat. 2383 (as amended) codified at 50 U.S.C. sec. 3383(d)(2)). The Strategy sets forth how...
EVEN THE STRONGEST ENCRYPTION BECOMES OBSOLETE
A message originally believed to be nearly impossible to break, becomes breakable some time later. A former U.S. government Data Encryption Standard (DES) encryption algorithm, was first officially broken in 1997, followed by a more efficient break in...
In recent years, we have seen a number of devastating cyber attacks and security breaches related to intercepted business and personal communications. This is not surprising, considering that employees use inherently insecure telecom networks to communicate sensitive business and personal...
While the world of malware has given rise to antivirus companies, the Sony Pictures attack revealed vulnerabilities that U.S. businesses have when it comes to attacks by sovereign states or their proxies. SECROM is preparing to launch its first generation Unified Communications (UC) solution...