by The Bear Team | Apr 1, 2019 | Security
Who Do You Trust?I was reading an article today about blockchain in 5G and it got me thinking about how this type of blockchain system would actually work. We have written in the past about a new type of blockchain system that is optimized for systems at scale such...
by The Bear Team | Feb 18, 2019 | Security
Can One Exist Without The Other?If you were to ask enterprise IT people what the most common security risk is, most would point to people. If, however, you were to dig a little deeper, you would discover that people are enabled through a lack of proper configuration....
by Ken Tola | Jan 14, 2018 | Security
DNS…Seriously? The gist of “safe” crypto exchanges is supposed to be the validation of a given transaction by more than the two parties involved in the transfer of information. Depending on the cryptocurrency involved, this type of effort...
by Ken Tola | Jan 10, 2018 | Our Technology, Security
A Cloudy Problem Spectre and Meltdown are not really a massive concern for home computers – sure it is an exploit but unlikely to be used. The actual problem is focused on the world of virtualization and, in that regard, cloud-based EVERYTHING is open and...
by Ken Tola | Jan 7, 2018 | Security
Seriously, Another Band-Aid? By now everybody has heard of the massive flaw that impacts Apple, Microsoft and everybody else using an Intel chip. The exploit is huge, the solution will slow down computers by up to 30% and we do not know when the patch will...
by Ken Tola | Dec 19, 2017 | Security
You Need 2FA Two Factor Authentication (or 2FA) is the term given to those text messages with codes that you have to enter when logging in to a growing number of sites. If you have not already done so, you need to enable this feature EVERYWHERE. The reason is that...
Recent Comments