Estimates are that the cost of a relatively simple hack on retail giant Target this past December has reached over $1 billion to date, not to mention the ongoing legal exposure and subsequent damage to its high-value brand. The ripple effect of over one hundred...read more
Taking Aspirin for a Headache Caused by a Brain Aneurysm? The Most Popular Cyber Security Solutions Are Just That.
Taking Aspirin for a Headache Caused by a Brain Aneurysm? The Most Popular Cyber Security Solutions Are Just That. Billions of dollars are spent each year for cyber security solutions that simply don’t work. Even the newest and most popular solutions providers fail to...read more
Read this article on Sandboxing and watch the video of how sandboxing can be avoided through exploits in the Apple IOS:...read more
Information technology professionals are compelled to rely on vendors who provide what many so-called experts consider to be best-practices for cyber security. The difficulty is that there has been a significant failure on the part of solutions providers to recognize...read more
The fact is, we have pushed to the limits a more than thirty-year-old computing architecture designed by engineers who never envisioned the Internet or the security challenges that such a globally connected computing architecture would produce. The unpredictable and...read more
If nearly all solutions are attempting to deal with only symptoms and not the real problem, then what is the approach that can get us to genuine secure computing?
Experts, including the National Institute of Standards and Technology (NIST), NSA, DHS and DOD agree that security must be built into computers and applications and not just layered on top of the OS. For this reason, NIST has adopted the patented Vir2us specifications...read more
What makes this approach different from antivirus, firewalls and other so-called advanced threat cyber security solutions?
Antivirus and firewalls are list-based solutions and can only deal with known threats. In today’s world of morphing viruses and malware, these solutions are less than 27% effective. Symantec recently said that their average time to identify threats and update lists is...read more
So many other solutions are in the cloud or in proprietary computer hardware like firewalls. Why secure the network end-points or desktop computers?
Virtually every hack you have read about in the past decade began as a network end-point computer exploit. Endpoints have many vectors for exploits and by making the end-points secure you eliminate the ability of an exploit to propagate across networks and to other...read more
The Vir2us controller is a lightweight client that resides within the kernel and attests the computers bios on boot up to eliminate low-level exploits and corruption. This sealed controller serves up virtual isolated computer environments in containers from pristine...read more