Asherify

Asherify

IT Services and IT Consulting

Dallas, TX 33 followers

We help you build your business and find opportunities to maximize value.

About us

A modern data platform. We help companies to modernize their approach to data and analytics with flexible architectures and the latest technologies to streamline business insights from data while reducing cost and improving ROI

Website
www.asherify.com
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Dallas, TX
Type
Privately Held
Specialties
Consulting, Data Transformation, Analytics, Digital, Cloud Migration, Project Delivery, and Dashboard Visualization

Locations

Employees at Asherify

Updates

  • View organization page for Asherify, graphic

    33 followers

    This is pretty incredible! Thanks for sharing Ruben Valcarcel Feliu, MSc . This is another example of why at Asherify, when we are consulting with organizations regarding #cyberprotection and #dataarchitecture we often recommend Eclypses MicroToken Exchange MTE technology, and setup a discussion with Judson M. Stone. The eclypses data security solution has won multiple awards, including the Best Data Protection Solution by Cybernews Please connect with Jud or I if you are interested in learning more!

    View profile for Ruben V., graphic

    Bundelt krachten in de strijd tegen cybercrime, door mensen en organisaties aan elkaar te verbinden.

    Exploring common grounds in victim notification and boosting cyberresilliance. Today we met Troy Hunt and Charlotte Hunt CEO and COO of https://haveibeenpwned.com, the place on the internet to go to if you want to know if your credentials have been obtained in a databreach. We have formed a small group of professionals from Politie Nederland, Digital Trust Center, Nationaal Cyber Security Centrum (NCSC-NL), Openbaar Ministerie and Ministerie van Justitie en Veiligheid to exchange experiences on the subject of victim notification. To bad not every organisation was able to be there today. Todays goal: getting to know and inspire eachother and to boost our services to better help protect all possible victims of data breaches and cybercrime. It is always fun to see that if you share a common goal, the short introduction quickly changes into an on topic brainstorm in which time flies. We gained insights from Troy on #haveibeenpwned and shared experiences on interventions like #NoMoreLeaks where compagnies can join to protect their users/consumers so breached credentials will be automatically block when a person tries to log onto the site. And #checkyourhack where we shared a service to check if your credentials were on the #genesismarket or in the #qbot botnet. For me the password check service provided was a great insight. We will check if it is possible to share passwords within our privacy laws? If a password is discovered in multiple breaches password managers can block these automatically because they are not safe. I am eager to find out. What do you think? Are passwords alone considered as Personal Identifiable Information (PII)? Farid Boutiba, MSc. Bart Vrancken Barend Frans Rob Witteman Roeland van Zeijst CISSP CISM CIPP/E and everyone else, thanks for your participation today!

    • No alternative text description for this image

Similar pages