by The Bear Team | Feb 26, 2019 | Business
Component ChallengesAn article came out today about the long-standing lack of protection found in most cloud servers. The issue is not the operating systems, virtualization layers or applications – rather this issue is due to the motherboards not being...
by The Bear Team | Feb 21, 2019 | Business
Are You Ready For 5G?5G sounds amazing with the promise of more bandwidth than any of us can handle. Faster downloads, 32K video streaming (no that is not a real thing) and the ability to – finally – connect your smart toilet to your mobile app without...
by The Bear Team | Feb 20, 2019 | Business
Defining – And Breaking – Blockchain ProtectionWhile there are numerous books, deep technical whitepapers and advanced math that can explain blockchain to even the most advanced audience, simplification is always better in security. To this end, the...
by The Bear Team | Feb 18, 2019 | Security
Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper configuration....
by The Bear Team | Dec 1, 2018 | Business
Cybersecurity Anarchy: Using Disconnected Management to Protect your Systems “Anarchy: The state of a society being without authorities or an authoritative governing body.” Wiktionary Typically, if you take down a leader, then everyone else will run. But, what if...
by The Bear Team | Nov 26, 2018 | Business
“Almost 70 percent of global business operates, at least partly, in the cloud.” Cloud Security Alliance 2017 Report When facing a decision on whether or not to move to a public, private or hybrid cloud system, companies have to determine how much public exposure they...
by The Bear Team | Nov 21, 2018 | Business
There are only two types of companies: those that have been hacked, and those that will be. ~ Robert Mueller, Director at the FBI Despite spending over $170B last year, companies’ cybersecurity efforts are failing. Big Providers simply can’t keep up with...
by Ken Tola | May 30, 2018 | Business
How To Succeed In IoT It seems as if almost every article about IoT these days describes how insecure companies feel about connected devices. Just today, yet another article was published that focused on governments’ insecurity. For IoT providers, there has...
by Ken Tola | May 25, 2018 | Business
Nobody Believes The latest IoT attack, called Z-Wave, impacts over 100 MILLION devices. Popular routers were also just discovered to have a wide-open avenue of attack. While devices are getter smarter and IoT proliferates, the reality is that nobody believes that...
by Ken Tola | May 14, 2018 | Business
Wrong, Wrong, Wrong An article came out today that stated that email security does not work and cannot be easily fixed. The problem with this article is that email should NEVER try to secure itself – SMTP was never meant for complete security. Applications...
Recent Comments