SIMPLE Auto

SIMPLE Auto Bear Systems is building on its next generation cybersecurity platform to provide a range of SIMPLE (Secure Integrated ML Platform Leveraging Endpoints) solutions for the world’s most pressing needs.  This blog entry is one of a series of introductions...

SIMPLE Airlines

SIMPLE Airlines Bear Systems is building on its next generation cybersecurity platform to provide a range of SIMPLE (Secure Integrated ML Platform Leveraging Endpoints) solutions for the world’s most pressing needs.  This blog entry is one of a series of introductions...

SIMPLE Additive Manufacturing

SIMPLE Additive Manufacturing Bear Systems is building on its next generation cybersecurity platform to provide a range of SIMPLE (Secure Integrated ML Platform Leveraging Endpoints) solutions for the world’s most pressing needs.  This blog entry is one of a series of...

SIMPLE 5G

SIMPLE 5G Bear Systems is building on its next generation cybersecurity platform to provide a range of SIMPLE (Secure Integrated ML Platform Leveraging Endpoints) solutions for the world’s most pressing needs.  This blog entry is one of a series of introductions...

What Is SIMPLE?

What Is SIMPLE? Bear Systems has been building a new generation cybersecurity platform that works everywhere, is invisible to everything, and that overcomes literally all of the challenges facing online protection today.  Every time a deep technical person understands...

Our VPN Nightmare

Whether or not you are on board with Covid-19 being a deadly threat or not, it is clear that the response to this new virus is threatening businesses globally.  I am not talking about the services industry which, hopefully soon, the government will bailout… I am...

The Open Source Conundrum

Is It Really Open?There is a massive movement in the government right now to utilize open source code in an effort to prevent vendor lock-in.  Vendor lock-in is the issue wherein only one vendor can possibly support a given software release due to the complexity of...

Looking Correctly at Cyber OT

Informational Technology (IT) is primarily focused on the transfer, use, and in the case of cybersecurity, defense of data.  As such, IT cybersecurity attempts to find and destroy intrusions with little to no regard to operations. The evidence for this approach is...

Isolation Is Missing The Big Picture

Every time I hear about cybersecurity efforts, the focus is on a single device, a given process, piece of malware, and so forth.  While people pay lip service to proliferation, the target is one user’s actions, one infection of one machine and so forth.  To understand...

Finding Innovative Funds

Where’s The Money?As a startup with exciting new ideas and approaches, all that separates small businesses from massive success is the right kind of funding.  The right kind of funding is the kind that does not strip away ownership, force short-sightedness on...