The Blockchain POA

Who Do You Trust? I was reading an article today about blockchain in 5G and it got me thinking about how this type of blockchain system would actually work.  We have written in the past about a new type of blockchain system that is optimized for systems at scale such...

Security And Management

Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper configuration....

Cryptocurrency Fiasco

DNS…Seriously? The gist of “safe” crypto exchanges is supposed to be the validation of a given transaction by more than the two parties involved in the transfer of information.  Depending on the cryptocurrency involved, this type of effort...

Spectre & Meltdown: The Fix

A Cloudy Problem Spectre and Meltdown are not really a massive concern for home computers – sure it is an exploit but unlikely to be used.  The actual problem is focused on the world of virtualization and, in that regard, cloud-based EVERYTHING is open and...

Patches Will Not Work

Seriously, Another Band-Aid? By now everybody has heard of the massive flaw that impacts Apple, Microsoft and everybody else using an Intel chip.  The exploit is huge, the solution will slow down computers by up to 30% and we do not know when the patch will...

2FA – Protect Your Apps!

You Need 2FA Two Factor Authentication (or 2FA) is the term given to those text messages with codes that you have to enter when logging in to a growing number of sites.  If you have not already done so, you need to enable this feature EVERYWHERE. The reason is that...