One of challenges of cyber security at the CXO executive level is that legacy cyber security solutions have historically been seen as just an expense for the most part. However, next-generation solutions are poised to become one of biggest profit opportunities for...read more
There are several key reasons many companies are failing to successfully implement genuine cyber security. Cyber security was an after-thought of a computer industry that did not envision or plan for the connected world we live in today. Nearly all cyber security...read more
The Snowden incident, (where a government intelligence worker was able to easily copy and disseminate large amounts of highly classified data), highlights one of the fundamental problems of legacy cyber security and the thinking behind it. Like many complex...read more
Estimates are that the cost of a relatively simple hack on retail giant Target this past December has reached over $1 billion to date, not to mention the ongoing legal exposure and subsequent damage to its high-value brand. The ripple effect of over one hundred...read more
Taking Aspirin for a Headache Caused by a Brain Aneurysm? The Most Popular Cyber Security Solutions Are Just That.
Taking Aspirin for a Headache Caused by a Brain Aneurysm? The Most Popular Cyber Security Solutions Are Just That. Billions of dollars are spent each year for cyber security solutions that simply don’t work. Even the newest and most popular solutions providers fail to...read more
Read this article on Sandboxing and watch the video of how sandboxing can be avoided through exploits in the Apple IOS:...read more
Information technology professionals are compelled to rely on vendors who provide what many so-called experts consider to be best-practices for cyber security. The difficulty is that there has been a significant failure on the part of solutions providers to recognize...read more
The fact is, we have pushed to the limits a more than thirty-year-old computing architecture designed by engineers who never envisioned the Internet or the security challenges that such a globally connected computing architecture would produce. The unpredictable and...read more
If nearly all solutions are attempting to deal with only symptoms and not the real problem, then what is the approach that can get us to genuine secure computing?
Experts, including the National Institute of Standards and Technology (NIST), NSA, DHS and DOD agree that security must be built into computers and applications and not just layered on top of the OS. For this reason, NIST has adopted the patented Vir2us specifications...read more