Stopping The Reaper

Fear The Reaper In a prior post, we warned you that this was going to happen, that the series of bot attacks were a prelude to the real action.  Now it is here, the Reaper botnet attack is threatening to take down the Internet.  The best part? There is nothing we can...

Secure Unified Management Required

The Foundation Recently ARM revealed their new Platform Security Architecture which is a brilliant bottom-up model for securely loading systems in an IoT world.  Many mobile device manufacturers, such as Samsung, are following a similar path.  While these efforts are...

IoT Agents Required

What KRACK Teaches Us As the full ramifications of the KRACK exploit continue to expand, it is clear that the IoT world is completely unprepared for this type of event.  Moreover, it is apparent that the majority of periphery-based and API-based solutions are not...

Krack: The New Internet Drug

KRACK There is a new hack that impacts ALL WiFi devices – it is called Krack. Long story short, if your device connects to the Internet, home network or, really, anything, it can be taken over through this new security flaw.  While some companies, such as Apple,...

Why Traditional Security Fails

You Cannot Import Intelligence I was reading a couple of articles over the weekend – one on customizable malware and one on the modernization of an exploit kit – and I realized a foundational truth. Traditional security fails because its approach is...

Amused? Scared? Indifferent?

How Do You Respond? Last week a report revealed that over 3,000 industrial plants had been infected with malware in 2016 and you might imagine that would freak people out.  Yet when we talk with potential customers, security is – at most – some annoying...