Blog

The Blockchain POA

Who Do You Trust?I was reading an article today about blockchain in 5G and it got me thinking about how this type of blockchain system would actually work.  We have written in the past about a new type of blockchain system that is optimized for systems at...

read more

Is It All A Scan?

Scanning RealityAs part of my continuous effort to keep on top of cybersecurity, I was watching a CEH video yesterday which overviewed the various ways in which hackers search for vulnerabilities.  It all came down to the same end result - port scanning. I...

read more

Truly Secure Mobile Devices

I Can Hear YouA recent article brought to light - again - that all of our collective phone calls, texts, and video chats are completely exposed.  This is not new as many articles have discussed the complete lack of security for phone calls.  In fact,...

read more

Iridium Insanity?

Good Luck On Your Flight...Iridium has been around for a long time as our favorite GPS communications network.  Recently Iridium;'s new NEXT platform made the news when it helped the FAA ground Boeing 737 MAX airplanes.  In reading this article, the...

read more

The Correct Huawei

This Is StupidRecently the U.S. told Germany to drop Huawei (pronounced Wah Way) or lose out on intelligence gathering.  I get that people do not trust this Chinese manufacturer and many think that they are a front for Chinese spying... But this approach...

read more

Malware of DOOM

Death MalwareA recent article discusses how Triton, a particularly devastating form of malware, is taking down safety systems in critical infrastructure.  This malware destroys key mechanisms that act to stop catastrophes such as power plants blowing up,...

read more

Protecting The Pieces

Component ChallengesAn article came out today about the long-standing lack of protection found in most cloud servers.  The issue is not the operating systems, virtualization layers or applications - rather this issue is due to the motherboards not being...

read more

5G Privacy?

Are You Ready For 5G?5G sounds amazing with the promise of more bandwidth than any of us can handle.  Faster downloads, 32K video streaming (no that is not a real thing) and the ability to - finally - connect your smart toilet to your mobile app without...

read more

A New Blockchain Is Needed

Defining - And Breaking - Blockchain ProtectionWhile there are numerous books, deep technical whitepapers and advanced math that can explain blockchain to even the most advanced audience, simplification is always better in security.  To this end, the...

read more

Security And Management

Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper...

read more

Opportunity To Sell

How To Succeed In IoT It seems as if almost every article about IoT these days describes how insecure companies feel about connected devices.  Just today, yet another article was published that focused on governments' insecurity. For IoT providers, there...

read more

Future Proofing Devices

Nobody Believes The latest IoT attack, called Z-Wave, impacts over 100 MILLION devices.  Popular routers were also just discovered to have a wide-open avenue of attack.  While devices are getter smarter and IoT proliferates, the reality is that nobody...

read more

Securing Your Email

Wrong, Wrong, Wrong An article came out today that stated that email security does not work and cannot be easily fixed. The problem with this article is that email should NEVER try to secure itself - SMTP was never meant for complete security. ...

read more

Identity Theft: A User Guide

Fun In Canada I was recently on a trip in Northern Canada - you know the place where there is no cell phone reception and you can purchase 1 MB of Internet...weekly...  Given the exchange rates and my awesome credit card, I just took my credit card with...

read more