Blog

Security And Management

Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper...

read more

Opportunity To Sell

How To Succeed In IoT It seems as if almost every article about IoT these days describes how insecure companies feel about connected devices.  Just today, yet another article was published that focused on governments' insecurity. For IoT providers, there...

read more

Future Proofing Devices

Nobody Believes The latest IoT attack, called Z-Wave, impacts over 100 MILLION devices.  Popular routers were also just discovered to have a wide-open avenue of attack.  While devices are getter smarter and IoT proliferates, the reality is that nobody...

read more

Securing Your Email

Wrong, Wrong, Wrong An article came out today that stated that email security does not work and cannot be easily fixed. The problem with this article is that email should NEVER try to secure itself - SMTP was never meant for complete security. ...

read more

Identity Theft: A User Guide

Fun In Canada I was recently on a trip in Northern Canada - you know the place where there is no cell phone reception and you can purchase 1 MB of Internet...weekly...  Given the exchange rates and my awesome credit card, I just took my credit card with...

read more

The Business Reality Of Exploited Devices

Horror Or Opportunity? When we first started working on Bear, we spent significant time attempting to overcome one of the largest challenges facing the connected device world - how do we protect all of those open and exploited devices on the market? ...

read more

The Corporate Liability For DDoS Attacks

Setting The Stage In the past few days, the two largest DDoS attacks ever were recorded and both leveraged unprotected corporate servers.  The Dyn (Marai) attacks leveraged unprotected corporate IoT devices... Most companies feel that a large percentage of...

read more

Securely Saving Money

What To Do? I recently read that Xiaomi is coming out with high-end phones in the U.S. at a fraction of the cost of Apple and Samsung.  While these phones have proven their worth overseas, in the U.S. there is a ton of opposition to using these devices. Of...

read more

GDPR And Tracking for Online Marketing

Cookies Are Now Not Allowed If you unaware, tracking cookies on user computers have been growing more and more obsolete due to active antivirus software.  In fact, some estimates reveal that up to 40% of all online traffic goes unreported due to cookie...

read more

Missed Opportunity?

The Large Industrial World There is very large critical infrastructure that is controlled by Industrial control systems (ICS) and this world has never been more vulnerable to attack.  The security solutions that can solve these massive issues are being...

read more

Understanding The IoT And GDPR

Disparity I have always been a huge fan of SAS and their approach to R&D and acquisitions.  First, they spend a lot on new technologies in order to gain intelligent entrance into new markets.  They do not acquire new markets and then try to figure...

read more

Attention Investors

Investors Need To Read This No this is not a gambit to raise money (yes we are raising but that is beside the point!).  If you are an investor in any tech company (or almost any company at all these days), you need to pay attention to the new GDPR laws the...

read more

Fighting Privacy Fears

This Is Why Sales Stink As IoT companies continue to innovate and dazzle techies with unbelievable new features, one thing is not evolving - sales. The problem is that consumers are deathly afraid of losing what little privacy they have left. With local...

read more

GDPR and Security

You Are Not Ready There are tons of articles talking about how most companies are not prepared for the GDPR enforcement.  Many companies are just not taking this seriously or not understanding how much work there is to do... That is understandable and,...

read more

The GDPR BotNet Nightmare

First The Attack In the news today, a new type of botnet has figured out how to spread to connected devices in a peer-to-peer manner.  This means that gaining access anywhere on a network will rapidly compromise the entire system.  This is a huge issue for...

read more