qwerx

About qwerx

This author has not yet filled in any details.
So far qwerx has created 29 blog entries.

How QWERX Removes the User From the Security Chain To Minimize Risk

The user is often the weakest link in the security chain. Unfortunately, cybercriminals make use of this by relying on the vulnerable human element in their malicious schemes to steal credentials, sensitive information and identities. Common Cyber Attacks Targeted at Human Behavior Phishing is a [...]

How QWERX Removes the User From the Security Chain To Minimize Risk2022-08-02T23:32:13+00:00

QWERX Featured on OODA Loop’s Top Quantum Company List

QWERX was recently featured in OODA Loop’s Quantum Company list honoring 23 of the 1,300 firms that leverage quantum effects to provide real-world functionality. As one of the top 23 quantum companies, QWERX was recognized by the OODA Loop network for the importance we are [...]

QWERX Featured on OODA Loop’s Top Quantum Company List2022-08-02T23:22:55+00:00

7 Ways That QWERX’s Patented Authentication Solution Completely Changes the Game

What makes QWERX better than most other cybersecurity technologies? Just like in the lyrics of the Tina Turner song, QWERX “is simply the best.” Unlike the song, you won’t need to call QWERX when you need it, because once you’ve completed the quick and simple [...]

7 Ways That QWERX’s Patented Authentication Solution Completely Changes the Game2022-08-01T14:54:53+00:00

How QWERX Works: A Comprehensive Guide to Our Cybersecurity Technology

When you think of cybersecurity technology, what do you picture? Chances are you’ve experienced (and been frustrated by) clunky technology that wastes time and energy and even then, it simply doesn’t work very well.  Phishing scams, website spoofing, ransomware, malware and Internet of Things (IoT) [...]

How QWERX Works: A Comprehensive Guide to Our Cybersecurity Technology2022-08-01T14:55:49+00:00

The Simple, Efficient and Cost-Effective QWERX Solution

Zero trust architecture reduces threats, but it isn't infallible. Stolen, hacked and spoofed credentials remain a significant issue for organizations. And quantum strength attacks are on the horizon, ready to prey on static, public key infrastructure (PKI).  Enter QWERX. This patented technology uses ever-changing credentials [...]

The Simple, Efficient and Cost-Effective QWERX Solution2022-08-01T14:56:25+00:00

How QWERX Is Radically Revolutionizing the Cybersecurity Landscape

Successful businesses implement new and exciting technology and procedures, but so do fraudsters. When the bad guys are active, that’s when a new, disruptive approach to cybersecurity is required. Take the guesswork out of your defenses, and invest your time and innovation into what matters [...]

How QWERX Is Radically Revolutionizing the Cybersecurity Landscape2022-06-23T14:49:37+00:00

New Cyber Incident Reporting: The Inevitability of Bad News

The law firm Ballard Spahr LLP recently released an interesting report, “Financial Institutions Face Increasingly Stringent Federal Breach Reporting Requirements,” which describes a rapidly growing thicket of required reporting of cyber incidents by regulators.  Banking organizations regulated by the U.S. Federal Reserve, FDIC or OCC; [...]

New Cyber Incident Reporting: The Inevitability of Bad News2022-05-04T12:56:49+00:00

Wake Up Neo, The Metaverse is Calling

The Metaverse:  A total convergence of AI, Work From Home, Telemedicine, Gaming, Fintech, Cryptocurrency, infotainment, Call of Duty, e-Commerce, Sports, Streaming video and anything else you can push over a network. It is the next generation information system, the result of the evolutionary and revolutionary [...]

Wake Up Neo, The Metaverse is Calling2022-04-25T23:40:37+00:00

Users Are Losers: The Cyber Wisdom of Britney Spears

Hold in your mind’s eye that perfect image of Britney Spears. The pre-shorn, seatbelt-abiding, catsuit-wearing Britney in all her superstardom. Yes, that’s the one. Now look past the gloss and the scales will fall from your eyes as you begin to understand her guru-like wisdom [...]

Users Are Losers: The Cyber Wisdom of Britney Spears2022-04-25T23:39:22+00:00

Oy Vey for OT: New Day, New Vulns for the Industrial Internet of Things

This Tech Republic article details new critical vulnerabilities uncovered by researchers at Claroty’s Team82, who were motivated to do their research based on the inexorable migration to the cloud for central management of industrial control systems (ICS) and other Operational Technology (OT), i.e., the things [...]

Oy Vey for OT: New Day, New Vulns for the Industrial Internet of Things2022-04-26T02:00:49+00:00
Go to Top