Protecting The Pieces

Component ChallengesAn article came out today about the long-standing lack of protection found in most cloud servers.  The issue is not the operating systems, virtualization layers or applications – rather this issue is due to the motherboards not being...

5G Privacy?

Are You Ready For 5G?5G sounds amazing with the promise of more bandwidth than any of us can handle.  Faster downloads, 32K video streaming (no that is not a real thing) and the ability to – finally – connect your smart toilet to your mobile app without...

A New Blockchain Is Needed

Defining – And Breaking – Blockchain ProtectionWhile there are numerous books, deep technical whitepapers and advanced math that can explain blockchain to even the most advanced audience, simplification is always better in security.  To this end, the...

Security And Management

Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper configuration....