by Ken Tola | Jan 10, 2018 | Our Technology, Security
A Cloudy Problem Spectre and Meltdown are not really a massive concern for home computers – sure it is an exploit but unlikely to be used. The actual problem is focused on the world of virtualization and, in that regard, cloud-based EVERYTHING is open and...
by Ken Tola | Nov 13, 2017 | Our Technology, Security
Our Infrastructure Is Screwed News flash, we are ripe for the picking as not one agency is our government is properly protected against cyberattacks. Whether the attacks take us to the dark ages or cost over a trillion dollars, the fact is that we are completely...
by Ken Tola | Nov 3, 2017 | Our Technology
Blockchain Is Great… The concept of blockchain-protected transactions is great in those systems, such as cryptocurrency (e.g. Bitcoin), that can handle the massive overhead associated with the way in which this technology is currently implemented. Using secure...
by Ken Tola | Oct 18, 2017 | Our Technology
The Pendulum Dell recently announced a new distributed core in which all processing is pushed to edge IoT devices. Their rationale is that current centralized management systems are just too slow to handle the speed and autonomous nature of modern IoT deployments. ...
by Ken Tola | Mar 6, 2017 | Our Technology
An Evolution For Bear For the past 7 years, Bear has been focused on one thing – leveraging intelligent machines to move security chaos out of the enterprise. This effort culminated in our Visual Device Management (VDM) platform that enables complete security...
by Ken Tola | Jan 18, 2017 | Our Technology
The Best Tool For The Job One of the promises Bear promotes is the ability for a Trusted Provider to control the actual security vendors providing services to that provider’s customers and change out the vendors at any time with no impact to the customer. We...
Recent Comments