Act Before It Is Too Late

“With great power comes great responsibility” are fictional character Ben Parker’s last words to his nephew, the soon to be famous Peter Parker, more widely known as your friendly neighborhood Spiderman. While we’re certain Uncle Ben’s character had little knowledge of today’s digital world, his words remain true for its technology enterprises. As they make […]

Read More

Healthcare Compliance: What Matters Most

While we all instantly understand the motivation for cyber criminals to steal data from financial services companies, retailers, and other transaction-related businesses, it’s less obvious why healthcare is one of the top targeted industries when it comes to security breaches. The short answer is this – healthcare and insurance are forever connected, so payment information […]

Read More

Why Enterprises are Being Breached & How to Stop the Attacks

2017 has been a record year for cyberattacks on large enterprises, following years and years of less publicized but equally massive breaches. We are officially at the beginning of an era of widespread, targeted attacks, and we can expect to see more and more as cyber criminals continue to invest in their own software to […]

Read More

Access Control Security for Linux Environments: An Open and Shut Case

Enterprises are adopting more open platforms and technologies for all the right reasons: they can avoid expensive and complex vendor lock-ins, while also taking advantage of the increasingly robust ecosystem of applications and software that simply works better in a Unix/Linux environment. As more and more attacks are coming from inside organizations, managing privileged users […]

Read More

Financial Services Compliance: Raising the Bar

Financial services companies have long been leaders in leveraging technology, and as more and more fintech innovations permeate the world’s largest banks, brokerages, credit card companies, insurance companies and other related businesses, the upside associated with having more data and running more efficiently using software automation is that the “attack surface” is increasing. While the […]

Read More

Across the EU, Heightened Standards Securing Networks and Information Systems: Implementing the NIS Directive

The recently announced publication of ETSI TR 103 456, a technical report released by the European Telecommunications Standards Institute, raises not only awareness of the coming NIS Directive, but provides solid technical information vital to the implementation of the European Union’s legislation on cybersecurity.  Adopted by the European Parliament in July 2016, and entered into […]

Read More

Impact of Market Communications Partnership

Recently, we proudly highlighted our partnership with Market Communications. Headquartered in New York City, Market Communications expert team of professionals have a long history of working with financial institutions of all sizes, globally. At the time of the partnership announcement, Market Communications already implemented Krontech’s Single Connect solution for a large global bank for whom […]

Read More

Protect What You Connect: Krontech’s Vision, Our Collective Mission

Today Krontech introduced our new theme and tagline: Protect What You Connect™.   We have not taken the common path – we are disrupters and innovators, not because it is cool to be, but because we all share a common desire to protect what we connect.   These are more than just words to our […]

Read More

Will Legacy Infrastructure Strike Back?

Despite all of the investments being made in transforming networks, both those of service providers and the enterprises they serve, legacy equipment sitting in today’s networks will be around for some time. Why?   First, networks are big, complicated beasts and most IT and OT teams are transforming networks location by location, application by application, […]

Read More

Human Error to Intentional Misdeeds: From Downtime to Disaster

The hot news lately has been about the compromise of networks by outside intruders. The facts show that internal breaches, whether intentional or accidental, done innocently or with malicious intent, comprise nearly half of all hacks. Here are a few statistics:   43% of data breaches are internal, according to a recent Intel study. While external breaches […]

Read More