Blog
The Open Source Conundrum
Is It Really Open? There is a massive movement in the government right now to utilize open source code in an effort to prevent vendor lock-in. Vendor lock-in is the issue wherein only one vendor can possibly support a given...
Looking Correctly at Cyber OT
Informational Technology (IT) is primarily focused on the transfer, use, and in the case of cybersecurity, defense of data. As such, IT cybersecurity attempts to find and destroy intrusions with little to no regard to operations. The evidence for this...
Isolation Is Missing The Big Picture
Every time I hear about cybersecurity efforts, the focus is on a single device, a given process, piece of malware, and so forth. While people pay lip service to proliferation, the target is one user’s actions, one infection of one machine and so forth. To understand...
Finding Innovative Funds
Where's The Money?As a startup with exciting new ideas and approaches, all that separates small businesses from massive success is the right kind of funding. The right kind of funding is the kind that does not strip away ownership, force short-sightedness...
Hybrid Source Security
The Open Source MovementFor those living under a rock, there is a massive effort underway by the government, military, and large corporations to move away for proprietary, closed systems to open source projects. There are just too many issues with closed...
Stopping Malware’s Main Challenge
Why Malware Hurts A random office colleague opens a very realistic email and inadvertently downloads a small piece of software called a "payloader". That payloader then calls home and a remote hacker starts injecting various malware - viruses really - into your...
Network Isolation Has Failed
Flawed RoutingI remember a few years ago when I was talking with some people in charge of building nuclear plants and how they went on and on about how secure their systems were due to network isolation. I kept attempting to point out that between their...
Comprehensive Device & Communications Security
AI-Drive, End-to-End Protection, Enabling non-Cybersecurity Admins to Manage Network Security
The Blockchain POA
Who Do You Trust?I was reading an article today about blockchain in 5G and it got me thinking about how this type of blockchain system would actually work. We have written in the past about a new type of blockchain system that is optimized for systems at...
Is It All A Scan?
Scanning RealityAs part of my continuous effort to keep on top of cybersecurity, I was watching a CEH video yesterday which overviewed the various ways in which hackers search for vulnerabilities. It all came down to the same end result - port scanning. I...
Truly Secure Mobile Devices
I Can Hear YouA recent article brought to light - again - that all of our collective phone calls, texts, and video chats are completely exposed. This is not new as many articles have discussed the complete lack of security for phone calls. In fact,...
Iridium Insanity?
Good Luck On Your Flight...Iridium has been around for a long time as our favorite GPS communications network. Recently Iridium;'s new NEXT platform made the news when it helped the FAA ground Boeing 737 MAX airplanes. In reading this article, the...
The Correct Huawei
This Is StupidRecently the U.S. told Germany to drop Huawei (pronounced Wah Way) or lose out on intelligence gathering. I get that people do not trust this Chinese manufacturer and many think that they are a front for Chinese spying... But this approach...
Malware of DOOM
Death MalwareA recent article discusses how Triton, a particularly devastating form of malware, is taking down safety systems in critical infrastructure. This malware destroys key mechanisms that act to stop catastrophes such as power plants blowing up,...
Protecting The Pieces
Component ChallengesAn article came out today about the long-standing lack of protection found in most cloud servers. The issue is not the operating systems, virtualization layers or applications - rather this issue is due to the motherboards not being...
5G Privacy?
Are You Ready For 5G?5G sounds amazing with the promise of more bandwidth than any of us can handle. Faster downloads, 32K video streaming (no that is not a real thing) and the ability to - finally - connect your smart toilet to your mobile app without...
A New Blockchain Is Needed
Defining - And Breaking - Blockchain ProtectionWhile there are numerous books, deep technical whitepapers and advanced math that can explain blockchain to even the most advanced audience, simplification is always better in security. To this end, the...
Security And Management
Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper...