Blog

Future Proofing Devices

Nobody Believes The latest IoT attack, called Z-Wave, impacts over 100 MILLION devices.  Popular routers were also just discovered to have a wide-open avenue of attack.  While devices are getter smarter and IoT proliferates, the reality is that nobody...

read more

Securing Your Email

Wrong, Wrong, Wrong An article came out today that stated that email security does not work and cannot be easily fixed. The problem with this article is that email should NEVER try to secure itself - SMTP was never meant for complete security. ...

read more

Identity Theft: A User Guide

Fun In Canada I was recently on a trip in Northern Canada - you know the place where there is no cell phone reception and you can purchase 1 MB of Internet...weekly...  Given the exchange rates and my awesome credit card, I just took my credit card with...

read more

The Business Reality Of Exploited Devices

Horror Or Opportunity? When we first started working on Bear, we spent significant time attempting to overcome one of the largest challenges facing the connected device world - how do we protect all of those open and exploited devices on the market? ...

read more

The Corporate Liability For DDoS Attacks

Setting The Stage In the past few days, the two largest DDoS attacks ever were recorded and both leveraged unprotected corporate servers.  The Dyn (Marai) attacks leveraged unprotected corporate IoT devices... Most companies feel that a large percentage of...

read more

Securely Saving Money

What To Do? I recently read that Xiaomi is coming out with high-end phones in the U.S. at a fraction of the cost of Apple and Samsung.  While these phones have proven their worth overseas, in the U.S. there is a ton of opposition to using these devices. Of...

read more

GDPR And Tracking for Online Marketing

Cookies Are Now Not Allowed If you unaware, tracking cookies on user computers have been growing more and more obsolete due to active antivirus software.  In fact, some estimates reveal that up to 40% of all online traffic goes unreported due to cookie...

read more

Missed Opportunity?

The Large Industrial World There is very large critical infrastructure that is controlled by Industrial control systems (ICS) and this world has never been more vulnerable to attack.  The security solutions that can solve these massive issues are being...

read more

Understanding The IoT And GDPR

Disparity I have always been a huge fan of SAS and their approach to R&D and acquisitions.  First, they spend a lot on new technologies in order to gain intelligent entrance into new markets.  They do not acquire new markets and then try to figure...

read more

Attention Investors

Investors Need To Read This No this is not a gambit to raise money (yes we are raising but that is beside the point!).  If you are an investor in any tech company (or almost any company at all these days), you need to pay attention to the new GDPR laws the...

read more

Fighting Privacy Fears

This Is Why Sales Stink As IoT companies continue to innovate and dazzle techies with unbelievable new features, one thing is not evolving - sales. The problem is that consumers are deathly afraid of losing what little privacy they have left. With local...

read more

GDPR and Security

You Are Not Ready There are tons of articles talking about how most companies are not prepared for the GDPR enforcement.  Many companies are just not taking this seriously or not understanding how much work there is to do... That is understandable and,...

read more

The GDPR BotNet Nightmare

First The Attack In the news today, a new type of botnet has figured out how to spread to connected devices in a peer-to-peer manner.  This means that gaining access anywhere on a network will rapidly compromise the entire system.  This is a huge issue for...

read more

Securing Your Customers

Big Potential...Flat Sales We have all heard about the powerful future of consumer connected devices - billions of devices catering to our every need.  Each year is going to be The Year when adoption skyrockets and we leap forward as a population. So what...

read more

Secure Device Data Collection

Sounds Like HIPAA In a highly recommended series of blog posts, Nasdaq is taking companies through a step-by-step process to ensure GDPR compliance.  The first step is to raise awareness and provide a complete audit trail of consumer data - from the...

read more

The Buck Stops Everywhere

No More Pointing Fingers In the old days - circa any time prior to May 2018 - companies got away with pointing fingers are third-party providers in order to avoid financial penalties in response to privacy hacks.  Despite not having anything in place...

read more

GDPR And HIPAA

Are You Prepared? I recently read a great article comparing the GDPR regulations - which are going to be enforced starting in May - to HIPAA.  A few things are clear from this article: While there is overlap, they each have disparate measures in place...

read more

Secure Supply Chain Management (SCM)

Not Just For Companies Supply Chain Management (SCM) security is mainly focused on protecting downstream products from upstream issues.  For example, a smart appliance might have numerous sensors, boards, and chips controlling its different...

read more