by Ken Tola | Oct 24, 2017 | Security
Fear The Reaper In a prior post, we warned you that this was going to happen, that the series of bot attacks were a prelude to the real action. Now it is here, the Reaper botnet attack is threatening to take down the Internet. The best part? There is nothing we can...
by Ken Tola | Oct 23, 2017 | Security
The Foundation Recently ARM revealed their new Platform Security Architecture which is a brilliant bottom-up model for securely loading systems in an IoT world. Many mobile device manufacturers, such as Samsung, are following a similar path. While these efforts are...
by Ken Tola | Oct 17, 2017 | Security
What KRACK Teaches Us As the full ramifications of the KRACK exploit continue to expand, it is clear that the IoT world is completely unprepared for this type of event. Moreover, it is apparent that the majority of periphery-based and API-based solutions are not...
by Ken Tola | Oct 16, 2017 | Security
KRACK There is a new hack that impacts ALL WiFi devices – it is called Krack. Long story short, if your device connects to the Internet, home network or, really, anything, it can be taken over through this new security flaw. While some companies, such as Apple,...
by Ken Tola | Apr 3, 2017 | Security
You Cannot Import Intelligence I was reading a couple of articles over the weekend – one on customizable malware and one on the modernization of an exploit kit – and I realized a foundational truth. Traditional security fails because its approach is...
by Ken Tola | Mar 27, 2017 | Security
How Do You Respond? Last week a report revealed that over 3,000 industrial plants had been infected with malware in 2016 and you might imagine that would freak people out. Yet when we talk with potential customers, security is – at most – some annoying...
Recent Comments