{"id":1376,"date":"2021-12-07T00:03:01","date_gmt":"2021-12-07T00:03:01","guid":{"rendered":"https:\/\/web.blockframetech.com\/dev\/?p=1376"},"modified":"2021-12-07T00:03:03","modified_gmt":"2021-12-07T00:03:03","slug":"the-importance-of-proactive-cyber-security","status":"publish","type":"post","link":"https:\/\/web.blockframetech.com\/dev\/uncategorized\/the-importance-of-proactive-cyber-security\/","title":{"rendered":"The Importance of Proactive Cyber Security"},"content":{"rendered":"\n<p>BlockFrame CEO C. Gorog quoted in this article:<\/p>\n\n\n\n<p>Unfortunately, a lot of companies are reactive instead of proactive when it comes to cyber security. \u201cBeing a company that focuses on proactive cybersecurity, I would say that this trend lies heavily in two very related areas. The current practices and knowledge base in the cyber security industry are mostly from the perspective of how security has been done for the most part since the existence of this industry,\u201d Chris Gorog, CEO\/CTO<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/web.blockframetech.com\/dev\/\">\u00a0Blockframe, Inc<\/a>., said. \u201cThe industry has gained much of its early practices from the needs for the military and follows the pattern of transferring knowledge from similarly assessed areas of which have mostly learned from years of physical security.\u201d\u00a0 <a href=\"https:\/\/buttonwoodtree.net\/index.php\/2021\/11\/16\/cyber-security-startup-source-valued-at-4-5-billion\/\" data-type=\"URL\" data-id=\"https:\/\/buttonwoodtree.net\/index.php\/2021\/11\/16\/cyber-security-startup-source-valued-at-4-5-billion\/\">Read more here &#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BlockFrame CEO C. Gorog quoted in this article: Unfortunately, a lot of companies are reactive instead of proactive when it comes to cyber security. \u201cBeing a company that focuses on proactive cybersecurity, I would say that this trend lies heavily in two very related areas. The current practices and knowledge base in the cyber security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1376","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"depicter-thumbnail":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Subhash","author_link":"https:\/\/web.blockframetech.com\/dev\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"BlockFrame CEO C. Gorog quoted in this article: Unfortunately, a lot of companies are reactive instead of proactive when it comes to cyber security. \u201cBeing a company that focuses on proactive cybersecurity, I would say that this trend lies heavily in two very related areas. The current practices and knowledge base in the cyber security&hellip;","_links":{"self":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/posts\/1376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/comments?post=1376"}],"version-history":[{"count":1,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/posts\/1376\/revisions"}],"predecessor-version":[{"id":1377,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/posts\/1376\/revisions\/1377"}],"wp:attachment":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/media?parent=1376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/categories?post=1376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/tags?post=1376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}