Blog

Krack: The New Internet Drug

KRACK There is a new hack that impacts ALL WiFi devices - it is called Krack. Long story short, if your device connects to the Internet, home network or, really, anything, it can be taken over through this new security flaw.  While some companies, such as Apple,...

read more

Why Traditional Security Fails

You Cannot Import Intelligence I was reading a couple of articles over the weekend - one on customizable malware and one on the modernization of an exploit kit - and I realized a foundational truth. Traditional security fails because its approach is fundamentally...

read more

Amused? Scared? Indifferent?

How Do You Respond? Last week a report revealed that over 3,000 industrial plants had been infected with malware in 2016 and you might imagine that would freak people out.  Yet when we talk with potential customers, security is - at most - some annoying feature that...

read more

The Tiny, Deadly Honeypot

Let's Have Some Fun So yet another Point of Sale malware attack has been discovered...almost 6 months after the fact of course...and, yet again, our credit card data is being stolen. Is anybody really surprised these days?  Really? Don't you get the sense that swiping...

read more

Do Not Change…Please

From Us In response to a certain...printer who will not be named...we have decided as a group to write to all of you corporate types to set things straight. Who are "we"?  We are nation-sponsored hacking groups, black market code ninjas and other cyber-heroes (you...

read more

Stop Ignoring Us

We Are Important Too I am a printer, NOT the one from Office Space, but the one you LOVE, the one that produces those crisp, beautiful documents you love to share.  I work and work for you and ask for very little in return - paper on occasion, ink every now and...

read more

Where’s My Money?

You Made It...Right? You are the top dog, you made it to the Big Time, finally a leader who has been recognized - a true Executive... So why is all of your money being taken away?  What do you mean some techno goobers Way Down from you are the reason you just lost...

read more

Fighting The Power

CIA Hacks Home Devices Worldwide Gasp!  Shock!  <Stunned Face>!  The CIA is hacking your home devices! OK.  We all know these things happen and nobody is really shocked.  It seems that everybody is hacking us and most people have given up on their privacy which...

read more

Combating Malware

Pay Me 1 Billion Dollars Yet another wave of ransomware attacks were reported today and that got me to thinking about the best way to truly combat malware.  It is not through some sophisticated AI-driven anti-malware program or next generation cyber-defense shield....

read more

Stopping Backdoors

Oh No!  Not..err...Again... Did you hear about the "news" that a major Chinese manufacturer has been placing backdoors in all of their IoT devices? Were you remotely surprised?  If you were surprised was that only one manufacturer (so far) was implicated? The reality...

read more

Virtual Execution System

An Evolution For Bear For the past 7 years, Bear has been focused on one thing - leveraging intelligent machines to move security chaos out of the enterprise.  This effort culminated in our Visual Device Management (VDM) platform that enables complete security control...

read more

Misbehaving

Fixing Security Flaws A recent Microsoft zero-day exploit (you know the ones with no fix) is running rampant in the SMB world and nobody knows how long it will take Microsoft to close the hole.  The reasons as to why Microsoft does not immediately provide a fix in the...

read more

Vendor Neutrality

The Best Tool For The Job One of the promises Bear promotes is the ability for a Trusted Provider to control the actual security vendors providing services to that provider's customers and change out the vendors at any time with no impact to the customer.  We strongly...

read more

SCADA Is Not Security

What Is SCADA? SCADA is the dominant industrial automation control system in the world today.  Most large manufacturing systems, energy, and critical infrastructure are reliant upon it.  The "S" does not mean Security (SCADA stands for Supervisory Control and Data...

read more

Security Services

A Utility Got Hacked! Well...Not Really...It was just a laptop...but is was CLOSE Actually...that attempt not even as bad as it has been in the past... As it turns out that was just sensationalism BUT it did remind me of a story when I worked for a major utility that...

read more

Too Many Products

Not Enough Solutions Do you know when you say something and do not listen to what you are saying? Do You Understand The Words... For a while now, I have been saying 3 main things: Bear is focusing on the IoT as traditional enterprise security is a crowded mess of...

read more

Xmas Bot Gift Proves Bear Approach

Being On The Outside Sucks An article today documented a new Christmas day attack that was different from the sensational ones earlier this year.  This one, for me, is an evolution of a pattern we are seeing with hackers.  In the October attack, hackers figured out...

read more

The New 4th Approach

Understanding The Core Issue I have often said that you need to look at the real problem in order to have a chance at finding a solution.  For example, crime in inner cities is - in my mind - due to the lack of opportunities for those people.  You cannot solve these...

read more