Blog

Securing Your Customers

Big Potential...Flat Sales We have all heard about the powerful future of consumer connected devices - billions of devices catering to our every need.  Each year is going to be The Year when adoption skyrockets and we leap forward as a population. So what...

read more

Secure Device Data Collection

Sounds Like HIPAA In a highly recommended series of blog posts, Nasdaq is taking companies through a step-by-step process to ensure GDPR compliance.  The first step is to raise awareness and provide a complete audit trail of consumer data - from the...

read more

The Buck Stops Everywhere

No More Pointing Fingers In the old days - circa any time prior to May 2018 - companies got away with pointing fingers are third-party providers in order to avoid financial penalties in response to privacy hacks.  Despite not having anything in place...

read more

GDPR And HIPAA

Are You Prepared? I recently read a great article comparing the GDPR regulations - which are going to be enforced starting in May - to HIPAA.  A few things are clear from this article: While there is overlap, they each have disparate measures in place...

read more

Secure Supply Chain Management (SCM)

Not Just For Companies Supply Chain Management (SCM) security is mainly focused on protecting downstream products from upstream issues.  For example, a smart appliance might have numerous sensors, boards, and chips controlling its different...

read more

Lowering Manufacturing Costs

Finding Room On The Razor's Edge Device manufacturers typically have extremely small profit margins and are constantly looking for new ways to increase that gap.  Recently Medtronic announced a major re-org effort with the hope of obtaining some...

read more

Fixing Consumer IoT Sales

What Is The Issue? For years we have been hearing that the Internet of Things (IoT) will take over every aspect of our lives.  The main point of focus has been our homes which, by this time, were going to be completely automated, highly-responsive,...

read more

Cryptocurrency Fiasco

DNS...Seriously? The gist of "safe" crypto exchanges is supposed to be the validation of a given transaction by more than the two parties involved in the transfer of information.  Depending on the cryptocurrency involved, this type of effort...

read more

Spectre & Meltdown: The Fix

A Cloudy Problem Spectre and Meltdown are not really a massive concern for home computers - sure it is an exploit but unlikely to be used.  The actual problem is focused on the world of virtualization and, in that regard, cloud-based EVERYTHING is open and...

read more

Patches Will Not Work

Seriously, Another Band-Aid? By now everybody has heard of the massive flaw that impacts Apple, Microsoft and everybody else using an Intel chip.  The exploit is huge, the solution will slow down computers by up to 30% and we do not know when the...

read more

2FA – Protect Your Apps!

You Need 2FA Two Factor Authentication (or 2FA) is the term given to those text messages with codes that you have to enter when logging in to a growing number of sites.  If you have not already done so, you need to enable this feature EVERYWHERE. The...

read more

The Dreaded GDPR

The Dreaded What Now? This time of year is great for reading the litany of articles predicting the new year.  I especially love the articles that say we will be hacked more - that is akin to saying that the Patriots will probably win the Superbowl or the...

read more

Deadly Physical Malware

Ransomware Is The New Endgame We are now seeing the reality of a new wave of hacker activity devoted to shutting down largescale targets for ransom.  A few weeks ago it was a county in North Carolina, this week it is one in California.  While those attacks...

read more

Finally

Feeling The Heat Finally, after all of our consumer pain, companies are feeling the heat.  From being forced to pay massive settlements to entire C-Suites being fired, corporations are starting to experience the same digital misery most consumers have...

read more

ATMs Hacked

Withdrawal Fees? Today an article revealed that hackers are stealing money directly from ATM machines and, better yet, nobody can stop these attacks as they spread across the world.  For those following these types of events, this is just another failing...

read more

Security Is An Ecosystem…Not A Product

BitCoin Hacked! Today another major hack occurred with intruders obtained $75M in bitcoin from a cryptocurrency exchange in Slovenia.  This is actually not the first BitCoin hack, nor is it even the biggest attack on cryptocurrency.  At the same time, we...

read more

And It Begins

Do You Believe Us Now? A while ago, we blogged about the real threat hackers posed and yet we heard nothing back.  We warned you then that simply grabbing data or shutting down a service provider was not the true threat.  We tried to explain that cities...

read more

Stopping Malware

The Hard Way I was discussing malware with a couple of experts last week and they immediately focused on how to prevent malware from being downloaded and how to detect malware in an operating system.  This is the classic approach that I often refer to as...

read more