Zachary Amos

First Name
Zachary
Last Name
Amos

Member for

1 year 7 months
About

Zac is the Features Editor at ReHack and a regular contributor at AllBusiness, VentureBeat, and TalentCulture. For more of his coverage of cybersecurity, AI, and business tech, follow him on Twitter or LinkedIn.

Latest Posts

How to Implement Zero Trust for SMBs

Today’s digital landscape poses significant cybersecurity threats to small- and medium-sized businesses (SMBs). In the past, the castle-and-moat network security model — a protected perimeter to safeguard a company’s information and assets from cybercriminals — was sufficient. However, the rise of remote work and cloud-based applications calls for a zero-trust approach.

Zero trust is typical among larger enterprises and government bodies. Although SMBs can implement it, doing so may seem daunting. The following is an overview of the zero-trust security model, its importance and the steps brands must take to strengthen their online defenses.

How to Mitigate Insider Threats With Behavior Analytics

Insider threats can be challenging to deal with. Their prominence demands attention, but they can be hard to identify, and businesses don’t want to interrupt people’s work because of false positives. User and entity behavior analytics offers a solution.

What Is Behavior Analytics?

Behavioral analytics is a subset of machine learning focused on identifying how users or devices tend to act. In a security context, that means setting a baseline for normal behavior to detect suspicious activity.

How to Achieve Compliance in a Multicloud Environment

Regulatory compliance is an ever-evolving field for technology professionals. As cybercrime continues to grow, so do standards around acceptable data practices. This is a positive trend concerning cybersecurity and consumer privacy, but it can feel at odds with multicloud environments. Here are ways multicloud challenges regulations and strategies organizations can take to overcome compliance obstacles.

What Are the Implications of Quantum Computing for the Future of Data Security?

Quantum computing has the potential to change the data security landscape permanently. In as little as five years, it could make the most relied-upon encryption schemes ineffective — making businesses vulnerable to breaches.

Quantum Computing’s Impact on Data Security

Quantum computing can make some of the most common data security measures ineffective. While experts haven’t reached a consensus on how soon it will happen, many agree it will become an issue within the next few decades.