Peter W RungFeb 12, 20201 minIntroduction UltraIOV - Integrity Of the VoteConcerned about evil actors getting inside your voting database or intercepting the vote tallys while they are being transferred on the n...
Peter W RungJan 5, 20201 minNCoded Recognized in 30 Fabulous Companies 2020NCoded Communications is honored to announce we have been recognized as one of the Fabulous Technology companies for 2020 by The Silicon ...
Peter W RungDec 15, 20191 minNCoded Recognized as Top 10 Encryption Providers 2019NCoded Communications is honored to announce that we are recognized as one of the Top 10 Encryption Providers by Enterprise Security Maga...
Peter W RungAug 23, 20196 minSecuring IoT in 2019 & Beyond - Part 24.1 Architecture The first major areas to address is the computer, network and security architecture itself. We need to come to reason wi...
Peter W RungAug 21, 20192 minState of Security Attack Vectors1 Overview On the Newsweek site for August 17, 2019, there’s an article titled, “20 TEXAS CITIES HIT BY COORDINATED RANSOMWARE ATTACK, ST...
Peter W RungAug 19, 20197 minSecuring IoT in 2019 & Beyond - Part 11 Overview Many sources estimate that by end of 2020, 50 billion Internet of Things (IoT) devices will be deployed worldwide leading to a...
Peter W RungAug 12, 20196 minBlocking & Tackling the Treacherous 12 Cloud Cybersecurity IssuesA recent CSOonline article - http://bit.ly/2T42WwD - identified a dozen security threats in the cloud. The abstract referred to these thr...
Peter W RungJul 15, 20193 minSoftware Defined Perimeters (SDP) - The Gateway to Zero Trust Environments (ZTE)Software Defined Perimeter (SDP) An SDP is one of the pillars of a Zero Trust Environment (ZTE). It is network security architecture that...
Peter W RungJun 24, 20192 minIs the United States Prepared For And Protected From An Attack On Our Power Grids?In a recent article published by WIRED http://bit.ly/2FoRF4t The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid we learned of ...
Peter W RungMay 23, 20192 minQuantum Computing PatentsBefore quantum computers became a reality, cybersecurity attacks were already growing rapidly. Take these headlines as examples: * Cybera...
Peter W RungMay 23, 20192 minData Breaches in the United StatesLike clockwork, the number of data breaches and size of them grow each year. Why is this? The causes are several: 1. It’s become easy. Wh...
Peter W RungMay 23, 20193 minZero Trust Defined & ImplementedWhat is a Zero Trust Environment? NCoded Communications provides a Zero Trust Overlay on all OT Environments ensuring that you are comple...