Blog
Secure Device Data Collection
Sounds Like HIPAA In a highly recommended series of blog posts, Nasdaq is taking companies through a step-by-step process to ensure GDPR compliance. The first step is to raise awareness and provide a complete audit trail of consumer data - from the...
The Buck Stops Everywhere
No More Pointing Fingers In the old days - circa any time prior to May 2018 - companies got away with pointing fingers are third-party providers in order to avoid financial penalties in response to privacy hacks. Despite not having anything in place...
GDPR And HIPAA
Are You Prepared? I recently read a great article comparing the GDPR regulations - which are going to be enforced starting in May - to HIPAA. A few things are clear from this article: While there is overlap, they each have disparate measures in place...
Secure Supply Chain Management (SCM)
Not Just For Companies Supply Chain Management (SCM) security is mainly focused on protecting downstream products from upstream issues. For example, a smart appliance might have numerous sensors, boards, and chips controlling its different...
Lowering Manufacturing Costs
Finding Room On The Razor's Edge Device manufacturers typically have extremely small profit margins and are constantly looking for new ways to increase that gap. Recently Medtronic announced a major re-org effort with the hope of obtaining some...
Fixing Consumer IoT Sales
What Is The Issue? For years we have been hearing that the Internet of Things (IoT) will take over every aspect of our lives. The main point of focus has been our homes which, by this time, were going to be completely automated, highly-responsive,...
Cryptocurrency Fiasco
DNS...Seriously? The gist of "safe" crypto exchanges is supposed to be the validation of a given transaction by more than the two parties involved in the transfer of information. Depending on the cryptocurrency involved, this type of effort...
Spectre & Meltdown: The Fix
A Cloudy Problem Spectre and Meltdown are not really a massive concern for home computers - sure it is an exploit but unlikely to be used. The actual problem is focused on the world of virtualization and, in that regard, cloud-based EVERYTHING is open and...
Patches Will Not Work
Seriously, Another Band-Aid? By now everybody has heard of the massive flaw that impacts Apple, Microsoft and everybody else using an Intel chip. The exploit is huge, the solution will slow down computers by up to 30% and we do not know when the...
2FA – Protect Your Apps!
You Need 2FA Two Factor Authentication (or 2FA) is the term given to those text messages with codes that you have to enter when logging in to a growing number of sites. If you have not already done so, you need to enable this feature EVERYWHERE. The...
The Dreaded GDPR
The Dreaded What Now? This time of year is great for reading the litany of articles predicting the new year. I especially love the articles that say we will be hacked more - that is akin to saying that the Patriots will probably win the Superbowl or the...
Deadly Physical Malware
Ransomware Is The New Endgame We are now seeing the reality of a new wave of hacker activity devoted to shutting down largescale targets for ransom. A few weeks ago it was a county in North Carolina, this week it is one in California. While those attacks...
Finally
Feeling The Heat Finally, after all of our consumer pain, companies are feeling the heat. From being forced to pay massive settlements to entire C-Suites being fired, corporations are starting to experience the same digital misery most consumers have...
ATMs Hacked
Withdrawal Fees? Today an article revealed that hackers are stealing money directly from ATM machines and, better yet, nobody can stop these attacks as they spread across the world. For those following these types of events, this is just another failing...
Security Is An Ecosystem…Not A Product
BitCoin Hacked! Today another major hack occurred with intruders obtained $75M in bitcoin from a cryptocurrency exchange in Slovenia. This is actually not the first BitCoin hack, nor is it even the biggest attack on cryptocurrency. At the same time, we...
And It Begins
Do You Believe Us Now? A while ago, we blogged about the real threat hackers posed and yet we heard nothing back. We warned you then that simply grabbing data or shutting down a service provider was not the true threat. We tried to explain that cities...
Stopping Malware
The Hard Way I was discussing malware with a couple of experts last week and they immediately focused on how to prevent malware from being downloaded and how to detect malware in an operating system. This is the classic approach that I often refer to as...
Let’s Talk Services
That Scarecrow Is Screwed A recent report came out that talks about banks being in deep trouble as hackers are getting serious about accessing their systems. This follows on the heels of a report that our energy grid has been compromised. Everything in...