My Blog Posts

2016 28/Oct
evolution

Let’s face it! Humans are hardwired to be lazy. It’s also one the reasons current approaches to cyber security often fail with disastrous consequences. Now, don’t get your back up against the wall just yet – I’m just speaking a biological truth. People, critters, and even well designed machines will naturally choose the path of […]

Keep Reading
0
2016 28/Oct
chartcourse

We’re in dangerous waters. For decades, IT leadership has been focused on battening down the hatches, patching holes, and bailing out the water as fast as we can when it comes to protecting our digital treasures. But, let’s face it! It’s not working. Anyone who looks at the growing costs of cybersecurity breaches can tell […]

Keep Reading
0
2016 13/Sep
ancient_passwords

The first documented use of passwords can be traced back to at least 200 B.C. when Roman soldiers first used them to tell friend from foe around their encampments.  It was a system that was easily compromised in ancient times and our use of digital passwords in today’s modern world are just as vulnerable. What’s […]

Keep Reading
0
2016 13/Aug
hacked_android

Imagine if your home had over a million windows and doors? What are the chances that one or more of those entry points would be inadvertently left unlocked? What if there were thousands of invisible intruders attempting to gain access? As outlandish as that sounds, I’m sure we can all agree that it wouldn’t be […]

Keep Reading
0
2016 10/Jul
biometric_theft

Stealing biometric data is the ultimate form of identity theft and yours may already be at risk! In the very near future, all of your usernames, passwords, and pin numbers are going to be replaced by biometrics (read Dinosaurs and Passwords, A Shared Fate). Biometric authentication is an revolutionary advancement for digital security but comes with […]

Keep Reading
0
2016 1/Jul
pocket_computers

The enormous capabilities of smartphones, tablets, wearables, etc. are definitely “super” but are they secure? I think you can guess the answer to that question. If you thought your mobile devices were safe, you might want to take a second look at what could be lurking under the covers. How super are our phones and […]

Keep Reading
0
2016 18/Jun
hackers_love_smartdevices

If you like keeping your head buried in the sand with it comes to cyber security, then you probably don’t want to read the Symantec’s 2015 Internet Security Threat Report. At BluStor PMC, we’re on the frontline of developing innovative solutions to combat cyber security risks, but I’ll admit, things are far worse than even I […]

Keep Reading
0
2016 31/Mar
fossil

On a geologically timescale, dinosaurs were wiped out in the blink of an eye. The use of usernames and passwords are headed for a similar fate, but at a pace that will make your head spin. Within the next 5 years, the use of usernames, passwords, and PINs will become nearly extinct – replaced by significantly […]

Keep Reading
0
2016 1/Feb
cybercrime

Here’s a fact: the bad guys know who you are and they know how to open the doors to even your most sensitive secrets. Spoiler Alert! A key part of the solution is replacing vulnerable passwords, PINs, etc. with biometrics but more on that in a moment. The widespread use of social media means that […]

Keep Reading
0
12