Golden Helix is in a unique position to provide a secure on-premise analysis solution. This capability is based on two enablers. First, we build our software solutions from scratch and from the ground-up with the assumption that it should run on any operating system and potentially behind firewalls or even without internet access. Second, we provide these solutions on a licensing model based on training and supporting users, not… Read more »
There is no shortage of actors in cyberspace who can be a potential threat to an organization. The list ranges from high schoolers who want to put newly acquired skills to the test, employees or partners who have access to the company network, to professional hackers who intend to hold data hostage or plan to resell information. On the highest-end, some state-financed actors extend their… Read more »
Data and security breaches are a fact of life. Organizations are aware of the threats and putting their best efforts up to prevent them as much as possible. Industries across the entire spectrum have been exposed in recent years. I will go through a few examples to show how pervasive this issue has become. Target One prominent data breach occurred in… Read more »
Hospitals and testing labs are undergoing a digital transformation like any other business in our time. They deal with personal data in categories with the highest level of security requirements: personal identity and medical records. The architecture chosen to store and analyze this data is critical to provide the best protection against a data breach incident. The liability and institutional… Read more »