-
A Cyber Security Resource from Uncle Sam – #TIS22
ISPs could use all the help they can muster in the war against cyber criminals, cyber terrorists, and other bad actors. Brian Kettman faces this problem every day. As CTO of digiMAX Fiber, Kettman has found a no-cost scanning resource from the federal government that helps him understand potential vulnerabilities in his network. In the…
-
The Blockchain Home Surveillance Camera #CES2020
At CES2020, IoTex built on its CES2019 debut with a home surveillance camera produced in partnership with Tenvis. IoTex’s open-source blockchain technology secures the privacy of the end-user so that Tenvis or IoTex can’t see their customers’ personal information and video streams. The camera specifications are especially impressive for a $49 device. According to this…
-
Protect and Rescue, If Necessary #CES2020
A hardware device that will capture an image of your computer’s configuration, back-up all your files and provide virus and ransomware protection is what ResQ debuted at CES2020. Lose your computer or held up by a cyber bandit? No worries. Simply plug the ResQ Protect into your computer’s USB port and it will be restored…
-
Why Charge When Wireless Will Work? #CES2020
Using infrared optics that are invisible to the human eye, Wi-Charge demonstrated wireless power transfer of up to 2.25 Watts from a central hub to remote devices across a room. Using beam steering, they are able to dynamically direct the power and optimize efficiency, as evidenced by the moving train in their CES Unveiled booth.…
-
Race for a Secure 5G – #TIS19
“The reality is that 5G isn’t here,” states Bill Conner, President and CEO of Sonicwall. Speaking at the 2019 Independent Show, Conner suggests there is a great deal of marketing hype around 5G, while questions remain about spectrum, standards, and devices. He says if there is a race, “Let’s race for a safe, secure [5G]…
-
Beyond Secure Access – Safe Access #CES2018
One of the biggest challenges for security, whether in the physical or cyber world, is correctly identifying those who should have access to a given domain. Being able to verify multiple signatures of an individual is great, but it must be simple to use, while not causing significant delays. At CES2018, Global Net Solutions demonstrated…