Blog

GDPR And Tracking for Online Marketing

Cookies Are Now Not Allowed If you unaware, tracking cookies on user computers have been growing more and more obsolete due to active antivirus software.  In fact, some estimates reveal that up to 40% of all online traffic goes unreported due to cookie tracking...

read more

Missed Opportunity?

The Large Industrial World There is very large critical infrastructure that is controlled by Industrial control systems (ICS) and this world has never been more vulnerable to attack.  The security solutions that can solve these massive issues are being developed by...

read more

Understanding The IoT And GDPR

Disparity I have always been a huge fan of SAS and their approach to R&D and acquisitions.  First, they spend a lot on new technologies in order to gain intelligent entrance into new markets.  They do not acquire new markets and then try to figure things out -...

read more

Attention Investors

Investors Need To Read This No this is not a gambit to raise money (yes we are raising but that is beside the point!).  If you are an investor in any tech company (or almost any company at all these days), you need to pay attention to the new GDPR laws the EU is about...

read more

Fighting Privacy Fears

This Is Why Sales Stink As IoT companies continue to innovate and dazzle techies with unbelievable new features, one thing is not evolving - sales. The problem is that consumers are deathly afraid of losing what little privacy they have left. With local news and the...

read more

GDPR and Security

You Are Not Ready There are tons of articles talking about how most companies are not prepared for the GDPR enforcement.  Many companies are just not taking this seriously or not understanding how much work there is to do... That is understandable and, most likely, to...

read more

The GDPR BotNet Nightmare

First The Attack In the news today, a new type of botnet has figured out how to spread to connected devices in a peer-to-peer manner.  This means that gaining access anywhere on a network will rapidly compromise the entire system.  This is a huge issue for hospitals...

read more

Securing Your Customers

Big Potential...Flat Sales We have all heard about the powerful future of consumer connected devices - billions of devices catering to our every need.  Each year is going to be The Year when adoption skyrockets and we leap forward as a population. So what is the...

read more

Secure Device Data Collection

Sounds Like HIPAA In a highly recommended series of blog posts, Nasdaq is taking companies through a step-by-step process to ensure GDPR compliance.  The first step is to raise awareness and provide a complete audit trail of consumer data - from the point of...

read more

The Buck Stops Everywhere

No More Pointing Fingers In the old days - circa any time prior to May 2018 - companies got away with pointing fingers are third-party providers in order to avoid financial penalties in response to privacy hacks.  Despite not having anything in place to properly...

read more

GDPR And HIPAA

Are You Prepared? I recently read a great article comparing the GDPR regulations - which are going to be enforced starting in May - to HIPAA.  A few things are clear from this article: While there is overlap, they each have disparate measures in place In most cases,...

read more

Secure Supply Chain Management (SCM)

Not Just For Companies Supply Chain Management (SCM) security is mainly focused on protecting downstream products from upstream issues.  For example, a smart appliance might have numerous sensors, boards, and chips controlling its different parts.  If any of those...

read more

Lowering Manufacturing Costs

Finding Room On The Razor's Edge Device manufacturers typically have extremely small profit margins and are constantly looking for new ways to increase that gap.  Recently Medtronic announced a major re-org effort with the hope of obtaining some level of relief from...

read more

Fixing Consumer IoT Sales

What Is The Issue? For years we have been hearing that the Internet of Things (IoT) will take over every aspect of our lives.  The main point of focus has been our homes which, by this time, were going to be completely automated, highly-responsive, servants for our...

read more

Cryptocurrency Fiasco

DNS...Seriously? The gist of "safe" crypto exchanges is supposed to be the validation of a given transaction by more than the two parties involved in the transfer of information.  Depending on the cryptocurrency involved, this type of effort means three or more...

read more

Patches Will Not Work

Seriously, Another Band-Aid? By now everybody has heard of the massive flaw that impacts Apple, Microsoft and everybody else using an Intel chip.  The exploit is huge, the solution will slow down computers by up to 30% and we do not know when the patch will actually...

read more

2FA – Protect Your Apps!

You Need 2FA Two Factor Authentication (or 2FA) is the term given to those text messages with codes that you have to enter when logging in to a growing number of sites.  If you have not already done so, you need to enable this feature EVERYWHERE. The reason is that...

read more