Blogs from Frontiers of Science and Technology
Let’s face it! Humans are hardwired to be lazy. It’s also one the reasons current approaches to cybersecurity often fail with disastrous consequences. Now, don’t get your back up against the wall just yet – I’m just speaking a biological truth. People, critters, and even well-designed machines will naturally choose the path of least resistance […]
Keep ReadingGet ready to strap on your armor, mount your faithful steed, and … open your arms for a hug. If you’re going to effectively tackle organization change, you’re going to need to be resilient to attacks, fast-moving, and have no small amount of empathy for the people around you. I say “effectively” because there are […]
Keep ReadingControlling weather, pacifying volcanic eruptions, channeling energy from time and space? If you believe the stories, these and other unbelievable technologies forever disappeared from the face of the Earth when Atlantis sunk below the roiling ocean. Real or not, if the founders of Atlantis ever existed, they were certainly incredible innovators. The good news […]
Keep ReadingThe first documented use of passwords can be traced back to at least 200 B.C. when Roman soldiers first used them to tell friend from foe around their encampments. It was a system that was easily compromised in ancient times and our use of digital passwords in today’s modern world is just as vulnerable. What’s […]
Keep ReadingImagine if your home had over a million windows and doors? What are the chances that one or more of those entry points would be inadvertently left unlocked? What if there were thousands of invisible intruders attempting to gain access? As outlandish as that sounds, I’m sure we can all agree that it wouldn’t be […]
Keep ReadingIf you or your loved ones have been hospitalized anytime in the past several years, chances are they’ve been exposed to one or more potentially life-threatening cybersecurity vulnerabilities. I’m guessing that may come as a surprise to many of you. It’s not a scare tactic. It’s a harsh reality that will seem almost too big to […]
Keep ReadingStealing biometric data is the ultimate form of identity theft and yours may already be at risk! In the very near future, all of your usernames, passwords, and pin numbers are going to be replaced by biometrics (read Dinosaurs and Passwords, A Shared Fate). Biometric authentication is a revolutionary advancement for digital security but comes with […]
Keep ReadingThe enormous capabilities of smartphones, tablets, wearables, etc. are definitely “super” but are they secure? I think you can guess the answer to that question. If you thought your mobile devices were safe, you might want to take a second look at what could be lurking under the covers. How super are our phones and […]
Keep ReadingIf you like keeping your head buried in the sand with it comes to cybersecurity, then you probably don’t want to read the Symantec’s 2015 Internet Security Threat Report. At BluStor PMC, we’re on the frontline of developing innovative solutions to combat cybersecurity risks, but I’ll admit, things are far worse than even I suspected. You […]
Keep Reading
We’re in dangerous waters. For decades, IT leadership has been focused on battening down the hatches, patching holes, and bailing out the water as fast as we can when it comes to protecting our digital treasures. But, let’s face it! It’s not working. Anyone who looks at the growing costs of cybersecurity breaches can tell […]
Keep Reading