Articles and items of interest from Sysorex authors

  • November 3, 2016
    A massive earthquake hits Las Vegas and multiple casualties are rushed to the nearest hospital. As incoming patients go through triage, doctors rapidly assess their condition and prioritize treatment. In the craziness of the emergency room, patients could be misplaced without a precise locationing system in place. This is CODE BLACK. Recently, Sysorex was showcased during ACEP 2016’s ... Read
  • October 26, 2016
    Mindless henchmen under the spell of a master puppeteer, awakened to wreak havoc on civilization. Are these scary thoughts the result of the new season of The Walking Dead? Maybe I’m having nightmares about Halloween ghouls, inching ever closer in the dark? Nope. What’s got me pondering the undead is a cascade of crazy happenings involving ... Read
  • October 13, 2016
    90% of all data ever created was created in the past two years.* This astounding fact alone is enough to make IT managers look for the closest exit. When you’re overwhelmed by a lack of resources and budget, leveraging big data with an antiquated IT infrastructure can seem like an impossible task. No doubt your business data ... Read
  • October 11, 2016
    Wow-factor. It’s one of the best parts of new technology. Childhood dreams and impossible ideas not only come to exist but are highly integrated into our daily lives. The Internet of Things (IoT) phenomenon has the wow-factor that so many seek and try to harness in their ideas and products. But those who are security-minded test the ... Read
  • October 5, 2016
    Increasing business demands, server and storage limitations, tapped-out data centers … we’ve all seen it. As business grows, so does the need to determine how to support growing data and storage management needs. Increasingly apparent to me is that traditional “high-end” storage solutions simply are no longer capable of supporting today’s increasing IT requirements. In fact, ... Read
  • September 8, 2016
    PALO ALTO, Calif. – Sysorex (NASDAQ: SYRX), a developer of high performance analytics software and solutions, today announced it has secured an AirPatrol for Retail Properties managed services contract with a top mall operator. Sysorex’s AirPatrol for Retail Properties product will be live in a marquee shopping center and provide detailed visitor analytics, including foot counts, ... Read
  • August 4, 2016
    “What on earth is going on at Veteran’s Park?”  As we drove by, I glanced over to see it teeming with people. Young people. All glued to their phones. While they may have looked like zombies, it dawned on me (as I’m sure it has you) that they were immersed in the game Pokémon GO. For ... Read
  • July 13, 2016
    Of all the exciting new technologies and applications the explosion of sensors and network-connected things has brought to us, one of the most intriguing has to be indoor locationing – detecting and tracking mobile devices and assets in buildings based on their wireless signals for purposes ranging from asset tracking and security to visitor wayfinding ... Read
  • June 10, 2016
    Recently, a rather alarming headline appeared in my news feed (”Data dangers: Why publishers’ over-reliance on data puts them at risk”.) The author believes that newspapers publishers’ reliance on customer data makes them “vulnerable” because ad blockers and customer privacy legislation will lead to data scarcity. He makes an interesting point. Blockers and legislation will ... Read
  • June 7, 2016
    Excerpt from: The Wall Street Journal Esther Fung June 7, 2016. Shopping malls are going high-tech. Making technology investments to improve customer experiences has traditionally been the domain of retailers, which have introduced robots, touch-screen mirrors and virtual-reality goggles to attract shoppers to their stores in recent years. … “We’re bringing the same analytics Amazon used to crush bricks-and-mortar retailers into ... Read
  • June 2, 2016
    Bob Koblovsky, of Sysorex, was promoting new technology to help retailers track movements and habits of shoppers during the Retail Council of Canada conference. California tech company introduces its ‘passive’ sensors, which pick up on Wi-Fi, Bluetooth and cellular signals to help retailers track shoppers and shipments. Francine Kopun, Business Reporter Toronto Star, June 1, 2016 Imagine your trip ... Read
  • May 27, 2016
    “The best block is to not be there” – Mr. Miyagi Designing, installing, and maintaining your company’s infrastructure can be one heck of a job. I’ve been doing network architecture for about 20 years now and the best explanation I’ve ever found to tell people what I do is still, “I make sure packets go from ... Read
  • May 12, 2016
    Unless you’ve been living in a cave for the past few years, you’ve undoubtedly heard that Augmented Reality, the enhancement of the physical world with digital information, is the “next big thing.” AR, as it’s called, is hot and big tech firms such as Microsoft, Google, Facebook and Sony, have all announced upcoming AR products ... Read
  • May 5, 2016
    As someone living and breathing tech 24/7/365, it always comes as a shock when I’m speaking with another ‘80s baby and they have no idea what I’m talking about. One vivid memory was when a close friend moved across the country and our group of girl friends talked about having Skype Girl Nights. Only two ... Read
  • April 28, 2016
    The Internet of Things (IoT) is on track to land a spot on 2017’s Buzzwords to Avoid, but this is a misunderstanding. The Internet of Things isn’t just about connected toasters or watches, and to cast it that way is to do it a disservice. The wonder of IoT depends on what role you play: ... Read
  • April 21, 2016
    “Those who build have more to offer than those who tear things down.” Dr. Madeleine Albright spoke these words as she addressed the GITEC audience during the morning keynote last week. A speech full of experience and witty jokes, this one statement held my attention. Technology today is a constant race of innovation, so much so that ... Read
  • April 14, 2016
    Despite being a buzzword for a while now, beacons continue to bring excitement when they’re mentioned in conversation. Healthcare uses them to track inventory and assets, retail uses them to push notifications to potential buyers, and other industries inject them into their mobile strategy for additional purposes. Unfortunately, beacons are failing to meet the expectations we ... Read
  • April 7, 2016
    The second in a two-part series. To follow on The Last blog, we know there is value in the world of lasts that sensors and true innovation are building but can we put numbers to it? Where’s the money in IoT or the Internet of Things? Does IoT have an ROI? The answer lies in the incredible ... Read
  • March 31, 2016
    The first in a two-part series. Remember the first time you saw someone speak to their watch or the first time you saw a self-driving car? Of course, because you knew it was important as it was happening. However, it’s the LAST time you see something that takes the prize. The power of innovation doesn’t lie in ... Read
  • December 1, 2015
    This past week is momentous each year for many reasons: Thanksgiving, travel woes, Black Friday sales, and Cyber Monday sales. However, some big name stores such as Nordstrom, TJ Maxx, and Barnes and Noble cancelled the Thanksgiving shopping tradition and closed on what used to be one of the biggest shopping days of the year; ... Read
  • October 21, 2015
    The Internet skipped a beat recently when Disney posted a job listing for a “Global Intelligence Analyst Intern.” Looking for someone to assist with counter-terrorism, the post went viral and was later taken down. “Wait, what?? But this is the happiest place on earth,” said the Internet. However, Disney is one of many big businesses stepping ... Read
  • August 13, 2015
    “No one can ever replicate what the Cowboys did in the 1960s, they made it up right out of thin air.” – The Cowboys and the Indian Recently, ESPN published a story and video about how a man made it in America. With a truly innovative idea, A. Salam Qureishi brought data analytics to sports, making ... Read
  • July 13, 2015
    The day after shark week ends, people start entering the water again. Even though hours were spent watching and listening to gruesome fatalities, the cautioning data is quickly forgotten. We want more. We feel the same way about data – we want it and we want it all. An incredible amount of data flies around us ... Read
  • June 16, 2015
    If you weren’t able to make it to Citrix Synergy last month, or if you did attend but didn’t make it to the Enterprise Mobility Management Pavilion, you missed the opportunity to meet with the folks from AirPatrol, a new Citrix XenMobile partner. AirPatrol’s flagship product, ZoneDefense, is a security platform for wireless and cellular networks ... Read
  • June 5, 2015
    Fall-Inspired Success for Cellular Detection in Cells This past week, we sent our AirPatrol team to sponsor the Correctional Technology Association’s Annual Event in Daytona Beach (#CTA2015). Joined by over 30 other technology vendors and ambassadors from various prisons and other correctional facilities around the country, we offered two live ZoneDefense demonstrations: Live view of the CTA ... Read
  • April 22, 2015
    Whether we’re living under a rock, hiding out in the local watering hole or counting money in our mansions, we all have something in common: Apple is coming. And by that, I mean the Apple Watch is coming and they’re hoping things are going to change. We’ve seen the commercials. The Apple Watch is being billed as ... Read
  • March 26, 2015
    The man walked through the security doors after flashing his credentials. He wondered if the others had thought of this before. He woke up that morning knowing that his day would be different. He made his coffee stronger, and made an effort to kiss his wife before he left. Then, he carpooled to work; not ... Read
  • February 18, 2015
    Using contextual data to offer users personalized and relevant advertisements, using location data to nudge consumers towards stores and products they may be unaware of, or physically following how much time consumers spend at certain places – the applications for data tracking with smartphones is endless. Beacons are the most recent way to obtain and ... Read
  • January 13, 2015
    Still being in the early days of the Internet of Things, new ideas and new companies are popping up left and right and bigger players are swooping in to acquire them. These pioneers showed their guns last week at the annual Consumer Electronics Show (CES) in Las Vegas. Although CES 2015 ended, we left with enough ... Read
  • December 29, 2014
    I was one of the millions who watched The Interview over the weekend. Did I spend $5.99 to watch it? Yes. Would I have seen it in the theatres without all of the attention it got in the past few weeks? Absolutely not. The movie itself is typical; it’s not near the comedic level necessary to ... Read
  • December 18, 2014
    Cell phones facilitate crimes and allow inmates to continue to threaten the public while inside correctional institution walls. Cell phones are often a symptom of other illegal activity. So, in order to protect and secure, it is necessary to detect all mobile devices and alert the corrections officers on their location to take action. Federal and state prison ... Read
  • December 3, 2014
    How Smart Is Your Casino? The Intro With smartphone hardware advancements, we are seeing a shift of attention into mobile applications. Some apps cater social media, others deliver pizza, and some are trying to become smarter. Not just better, but smarter. What does this mean? With GPS on smartphones, it’s possible to track someone’s location and with the right ... Read
  • October 29, 2014
    First we had the innovations of Mr. Miyagi: wax on wax off. Then we were given the clapper: clap on clap off. Now we have the smart phone: app on, app off. With the smartphone, we have smart products; but how smart are they? With that said, we have the smart bulb. Yes, the smart bulb. ... Read
  • September 25, 2014
    Thursday September 25, 2014 – American businessmen were in Panama to introduce innovations in products and services The Commercial Service of the American Embassy held a cocktail party to welcome the group of American businessmen who formed the Trade Mission (Safety and Security), who arrived in the country to present their products and services. The event was ... Read
  • September 24, 2014
    Whether your company has a Bring Your Own Device (BYOD) policy established or not, employees are accessing corporate content on personal devices. And now, they’re doing so on the go. This should be seen as a step in the right direction as the ability to store and sync content from one device to another creates ... Read
  • September 18, 2014
    Ensuring immediate support for business critical workflows is uninterrupted. SUNNYVALE, Calif., Sept. 17, 2014 — Good Technology™, the leader in secure mobility, today announced the availability of a broad set of iOS 8-ready ISV apps, further extending the new features and functionality offered by iOS 8, designed to transform mobile businesses. The company also announced its ... Read
  • September 3, 2014
    We’ve all heard of it, some have done it and the number of people that actually know what it’s for is somewhere in between those two. Although there are debates that the Ice Bucket Challenge is a cry for attention or a waste of water among others, the viral campaign to raise awareness for ALS (Amyotrophic ... Read
  • August 27, 2014
    With one third of retail spending in the next five years coming from the Millennial generation (those born in 1977-1995), marketing strategy has to accommodate the needs of a generation that is accustomed to getting what it wants. Whether it is the playlist on his phone, the custom coffee bean in her drink, or our ... Read
  • August 14, 2014
    Years ago, Nike released Nike+ – a magical little device you could put into your shoe, connect to your iPod or iPhone and track your distance and calories burned. It took off like wildfire but not many users truly understood the sensor qualities of the device. Today, Bluetooth is one of the first words out of ... Read
  • July 22, 2014
    Foot traffic data is spinning around us with a dizzying effect. Why are we losing our equilibrium when looking at the conclusions of data? Think back on the days of Analytics 101, garbage data in -> garbage results out. What’s the value of data unless it captures what is really going on? We all have the same ... Read
  • July 8, 2014
    “The great thing with technology, is that if you don’t like it now, wait, it’ll change.” (WSJ Blog, 2014) Of everything online news has brought us, one of my favorite features is the comments section at the end of the article. I never skip it. Yes, it can be a depressing look at the writing skills ... Read
  • July 7, 2014
    Location-based security settings could remove the need for pass code in ‘safe’ environments Apple is working on a system that automatically unlocks iPhones when they are in safe locations like home or work, but locks them again when they leave the area. The system works by identifying where the iPhone is and allows users to set “safe” ... Read
  • July 1, 2014
    We have become so excited in collecting data, lots and lots of data, that we’re forgetting the most important part: analyzing and reporting. Many can take your Excel spreadsheet and create eye-catching pie charts and bar graphs, but what are you getting out of it. Using mobile, data is collected for a few main reasons: You have ... Read
  • June 26, 2014
    Apple sent a collective shudder through location-tracking and mobile marketing companies earlier this month when it announced that its upcoming iOS 8 release will include a feature that will dynamically generate a MAC address for the device when it’s looking for, but not connected to, a WiFi network. The MAC (media access control) address is ... Read
  • June 16, 2014
    Or any other food establishment? We’ve all done it. We walk into our favorite coffee shop or restaurant short on time, looking to grab a quick cup of coffee or bite to eat and there IT is. The one thing we dread most of all. The LINE. Suddenly, that quick bite or cup of coffee just turned into what ... Read
  • June 13, 2014
    There is a lot going on. A LOT. Last week I stayed in New York City for the Good Exchange and I needed a place to get dinner. Beyond the old-school method of asking the hotel desk for recommendations, I had the world of mobile and social media in my purse. Although GPS didn’t work so ... Read
  • June 11, 2014
    Hi, my name is Cleve and I regularly expect too much of my phone. When I’m traveling and my wife wants my itinerary, I many times have started to send it to her. But as soon as I unlock my phone and open my email to forward the details, I see a message marked URGENT and ... Read
  • June 4, 2014
    Delivers next-gen user experience, both in cloud and on-premise, with new secure mobile collaboration app, and expanded ecosystem. NEW YORK and SUNNYVALE, Calif., June 3, 2014 – Good Technology, the leader in secure mobility, today announced new additions to the company’s extensive and diverse ecosystem of Good-secured independent software vendors (ISVs) and partners, extending the capabilities of ... Read
  • June 4, 2014
    June 3, 2014 Tyler Waldman, Technical.ly Three hyperlocal mapping startup executives talked about the technology and its applications at Thursday’s Emerging Tech Forum. Imagine browsing the aisles at Giant or Safeway and stopping in front of the Chips Ahoy display. As you pause to contemplate your moral, financial and dietary dilemma, your phone goes off with a ... Read
  • May 29, 2014
    As someone who has gone through more than a couple acquisitions, it starts to become obvious that excitement sells. Not only do you need to have something profitable and “cool” now, but it needs to have a vision and that vision needs to be something the acquiring company wants to be a part of. Last night ... Read
  • May 27, 2014
    Mobile device locationing and cyber security firm bests dozens of others to be named “Superstar Company of the Year” at the 2014 Tech Awards MAPLE LAWN, MD May 27, 2014 – AirPatrol Corporation, a wholly-owned subsidiary of Sysorex Global Holdings Corp. (NASDAQ:SYRX), today announced it has been named “Superstar Company of the Year” by the Howard ... Read
  • May 7, 2014
    May 6, 2014 – Paul Samuel, The Daily Record AirPatrol Corp., of Maple Lawn, a manufacturer of location-based security systems, has been named the Superstar Company of the Year by the Howard Tech Council. AirPatrol was among seven companies selected by the HTC as winners of the 2014 Howard Tech Awards. The awards recognize technology companies that are ... Read
  • May 6, 2014
    Awardees to be recognized at May 28th Gala COLUMBIA, MD May 6, 2014 –The Howard Tech Council is proud to announce the winners of the 2014 Howard Tech Awards. Each of the awardees was nominated for recognition in one of six categories, and will be featured during this year’s awards ceremony at the Johns Hopkins Applied ... Read
  • May 1, 2014
    With growing levels of connectivity no matter where you are, it seems like we are never quite alone. Technology continues to reach out and touch us: reading a book has been replaced by time with a Kindle, our ovens can remotely start preheating via an app, and our acceptance of being recorded is growing. At ... Read
  • April 22, 2014
    April 21, 2014 – Baltimore Business Journal, Ryan McDonald. AirPatrol Corp., a Howard County cyber security firm that focuses on wireless and mobile systems, has been acquired by a Silicon Valley company in a deal worth up to $30 million. As part of the deal, Santa Clara, Calif.-based-Sysorex Global Holdings Corp. (NASDAQ:SYRX) paid $10 million in ... Read
  • April 15, 2014
    Although it sounds like a punk-rock band, as you probably know by now, Heartbleed isn’t something you can turn off by hitting skip on Pandora. In short, Heartbleed is a security bug in the open-source OpenSSL. Want more? Read this. Don’t want to read? Watch this. As an industry, we often talk about mobile security and ... Read
  • April 7, 2014
    Your cellular phone continuously provides information concerning your location. A new system for tracking cellular movement is now offered in Israel. iHLS (Israel’s Homeland Security Home) April 6, 2014 – ZoneDefense is a platform comprised of various interconnected sensors, all connected to a central command and control system that provides real time information concerning movements of cellular devices within the area covered ... Read
  • April 4, 2014
    Years ago, the only time I unplugged from the world was while 33,000ft high. Flying was a time for making lists, pleasure reading, or even naps. Now, with most flights equipped with WiFi, it’s become a time to catch up on emails or the latest BuzzFeed articles for my kids. And, assuming the regulatory changes ... Read
  • March 31, 2014
    In Baltimore, everything slid to a halt today. Companies let their employees leave early on a Monday and $8 for a hot dog covered in Old Bay and three kinds of cheese is considered reasonable. Only yesterday it snowed, hailed, sleeted and rained, but TODAY is gorgeous. The streets are packed and vibrating with energy. Why? ... Read
  • March 31, 2014
    March 31, 2014 – Mobile Enterprise AirPatrol Corporation’s ZoneDefense 5.0, the latest generation of mobile device detection and location security platforms, affirms redesigned software architecture—providing improved scalability, as well as a new browser-based interface. The location system is used by public sector agencies, major enterprises and other organizations, in order to monitor buildings for the presence of ... Read
  • March 13, 2014
    Mobile World Congress had cool devices, but even more impressive were the applications that businesses could leverage. March 12, 2014 – With 80,000 attendees from every part of the globe coming together in one place, the Mobile World Congress show is overwhelming to say the least. But beyond the marketing hype, the consumer announcements, the multilevel ... Read
  • March 11, 2014
    February 28, 2013 – CIO Review, Thomson Antony Columbia based AirPatrol develops location-based security and services solutions that identify, monitor and manage mobile devices on wireless and cellular networks. PCs, laptops and desktops today are limiting in terms of their function as they are basically computers. On the other hand, smartphones and tablets can be all kinds ... Read
  • March 7, 2014
    As location-based technologies take off there’s lots of hype about proximity versus positioning. Is there a difference, and if so, which is better? There’s little doubt that location-based technologies are the new hot kid. These days it seems you can’t turn a corner without bumping into a pundit expounding on how the location revolution is going ... Read
  • March 5, 2014
    March 4, 2014 – The Business Monthly When Howard County Executive Ken Ulman recently helped cut the ribbon at the new headquarters in Maple Lawn for cyberindustry firm AirPatrol Corp., the ceremony marked more than your typical ribbon cutting: It capped a determined effort by the county to retain a business that was considering relocation. “We are ... Read
  • March 3, 2014
    Crowding through the front doors of the Moscone Center, we all look like deer in the headlights. Rushing into the bright lights and recycled air of the conference’s lobby, we are desperate for some direction – where to go, when to be there, who to meet. There are lines for computers, lines for people behind ... Read
  • February 27, 2014
    AirPatrol took home the gold this past week and played well with the big dogs. We hosted our ribbon cutting ceremony on Feb 20 at the new headquarters in Maple Lawn, Maryland. With over 50 attendees, food, drinks and a live demonstration and discussion of ZoneDefense were enjoyed on a chilly day. Originally scheduled for the ... Read
  • February 24, 2014
    February 24, 2014. Katie V. Jones – The Baltimore Sun It was about nine months ago, during Howard County’s Business Appreciation Week, that County Executive Ken Ulman learned Columbia-based AirPatrol Corporation was thinking about relocating. Ulman’s reaction was immediate, said Guy Levy-Yurista, chief technology officer for AirPatrol. Officials said the county executive worked with the Howard County ... Read
  • February 20, 2014
    COLUMBIA, MD Feb 20, 2014 – Howard County Executive Ken Ulman today helped cut the ribbon on a new headquarters for cyber industry leader AirPatrol Corporation. The ceremony capped a determined effort by the county to retain a business that was considering relocation. “We are committed to building on Howard County’s position as a cyber and ... Read
  • February 13, 2014
    ATLANTA, GA Feb. 13, 2014  – AirWatch®, the world’s leading Enterprise Mobility Management (EMM) provider, announces the speaker lineup for AirWatch Connect Barcelona, the leading event for enterprise mobility at Mobile World Congress, Feb. 24 – 27, 2014, in hall 3, booth #3D10. Mobile World Congress attendees are invited to learn about the latest trends, ... Read
  • February 13, 2014
    “Context-Aware” is a technology buzzword getting a lot of misuse and that’s unfortunate because it’s actually a pretty cool thing Wander through any of the myriad of technology news and blog sites these days and you’re bound to stumble into the term “context-aware.” With everything from network security tools and mobile apps to smart watches and ... Read
  • February 12, 2014
    Ryan McDonald – Digital Producer, Baltimore Business Journal AirPatrol Corp., a Columbia cyber security company that focuses on wireless and mobile systems, plans to soon unveil its new 5,200-square-foot headquarters in the Maple Lawn Corporate Center in Howard County. The company announced it was moving from its previous location on Broken Land Parkway in July and had ... Read
  • February 7, 2014
    Tech giants are racing to find the newest way to the top. Acquisitions are a popular way to grow an established company’s reach to a new audience and with impressive new abilities. Mobile continues to be a hot concentration for internal growth and in acquisition possibilities. What makes one company more attractive than another? There’s ... Read
  • February 6, 2014
    Unified mobile device management and control from detection to policy administration. MCLEAN, VA February 6, 2014 – SENGEX will introduce and demonstrate their Mobile Security Ecosystem (MSE) solutions February 11-14 at the 2014 AFCEA West Conference in San Diego. Partnering with AirPatrol Corporation, AirWatch, and AMP’s Technology Solutions partners Websense and Appthority, SENGEX will present a live ... Read
  • February 4, 2014
    The sun shining, a cool breeze carrying you the scents of fresh fireworks, and endless WiFi to live post, Tweet, etc. to your heart’s content – it’s heaven on earth. It’s too good to be true. And, it was. Here are some numbers for you. At Sunday’s football game, unmatched data flow was recorded: Verizon data connections ... Read
  • January 22, 2014
    Each time there is a new brilliant idea or application for our solutions, we want it ready to go yesterday – not in two weeks, yesterday. Luckily, our engineers have worked for years in security and refuse to sacrifice security measures for a closer deadline. However, many of today’s technology and mobile applications do not have ... Read
  • January 16, 2014
    Once again, the internet is torn. Continuing what Edward Snowden started, there are activists and protesters calling for the boycott of one of the biggest annual events in information security. At the time of writing this, 7 speakers have pulled out and the number of cancelled registrants can only be speculated. But is this really a ... Read
  • January 8, 2014
    We’re only a week into 2014 and it’s already shaping up to be a powerful year for mobile, technology, and AirPatrol. Just this past Monday, Sysorex sent out a press release on its definitive agreement to acquire us (you can read it here). I couldn’t be more excited about this development for AirPatrol Corporation. Since coming ... Read
  • December 26, 2013
    Nice job this year. The Ollo Clip fish-eye lens for my iPhone affirms that my photography skills continue to be unmatched. Also, I doubt I possess the self-control to have any chocolate or candy canes remaining by the time 2014 rolls around. With that in mind, I have a couple “wants” for next year. I know ... Read
  • December 17, 2013
    We’ve reached an interesting predicament. We’re constantly on the move, and we want our devices to keep up. We want smart devices – ones that feed us what we need at just the right time. Oh, and we want these devices to be secure and have a respectable battery life. Ironically, the necessary power to ... Read
  • December 6, 2013
    Over the weekend, and timed by chance right before Cyber Monday, Amazon announced their plans to have drone delivery as an option. As a loyal Prime member, Amazon Prime Air made me burst out laughing as I imagined a drone carrying a variety of box shapes and sizes over pastures and streams to my rural ... Read
  • December 3, 2013
    Remember the days when everyone wanted a Tickle Me Elmo? People waited for hours and sometimes days for a chance to get the hottest toy of the year. But, that was almost 10 years ago. Now, Cyber Monday battles Black Friday as the biggest shopping day of the year. This year, Black Friday online sales were ... Read
  • November 20, 2013
    Yesterday, I ventured into windy DC and was blown away by the presence of the Internet of Things inside a city so full of history. The FTC held a workshop with discussions from technology leaders such as Google’s VP and Chief Internet Evangelist, Vint Cerf, who mentioned his original ideas of IOT during the early ... Read
  • November 14, 2013
    There’s a generational gap in the Internet and I might be on the wrong side of the canyon. Greetings from my “Grandpa Box.” If you’re wondering if that’s a term for some sort of geriatric storage container, no, it’s not. It’s what my 23 year-old son calls my year-and-a-half old top-of-the-line laptop. “Grandpa Box.” It just sounds old. ... Read
  • November 8, 2013
    When I first heard about the Google Mystery Barges, I couldn’t wait to figure out what they were. As an innovative company and a leader in new technology solutions, these HAD to be something great. And they might be, but the breaking news is that they aren’t anything earth shattering – possibly just a place ... Read
  • October 31, 2013
    Once a year, we thrive off of getting spooked. We dress up in wild costumes, walk through dark and frightening forests, watch scary movies, and get sugar highs from bags and bags of candy. Some of the best technology companies even dress up in costumes. Growing up, I didn’t like to be scared and I still ... Read
  • October 10, 2013
    Corporate America too often ignores the need to bolster cyber security. Art Jacoby, Contributing Columnist – Baltimore Business Journal Termites. The dreaded insect that strikes fear in the heart of every homeowner. The mere mention of the word makes millions of hearts beat faster and throats go dry. Termites cause an estimated $5 billion in damages ... Read
  • October 8, 2013
    In the workplace this “Bring Your Own Device” (BYOD) phenomenon presents a troublesome dilemma for IT: employees love them and they can improve productivity, but permitting random devices to run around the building unsecured doing who-know-what over cellular and WiFi networks is an invitation for trouble… Read
  • October 7, 2013
    My friend’s son, Tony, was on the phone with Verizon yesterday and was told to hit the “pound sign.” He looked at the key pad and said, “the what sign?” The Verizon robot repeated the directions and he looked at me for help. As I pointed to the #, Tony said, “OH, hashtag!” This was well ... Read
  • October 3, 2013
    ZDNet has a story today on Symantec’s annual Norton Report, an international study that examines consumer’s online habits, attitudes toward security and the costs of cybercrime. The study, which surveyed a little over 13,000 adults in 24 countries cited numbers on par with other mobile user studies: 63% had a smartphone and nearly half (48%) ... Read
  • September 25, 2013
    Baseball has been America’s favorite past time since creation and in large, it hasn’t changed much. In fact, the idea of innovating the game hasn’t even come up. However, a lot has been done with various parts of the game such as kickball (same layout, different ball), t-ball (lighter ball and bat, no pitcher) and even ... Read
  • September 20, 2013
    By Amy Lee | September 17, 2013 … “The vulnerability is tailored to a specific device,” says Dr. Guy Levy-Yurista, Chief Technology Officer at AirPatrol Corporation, a provider of wireless security based in Columbia, MD. “There’s some trial and error on the part of the hacker that would have to happen. It’s really (on) a device by device ... Read
  • September 18, 2013
    For teens mobile locationing may be synonymous with “tracking,” but for adults it’s a whole different story It’s been a few years, but I still know how to get down the backstairs and out the door without any one in the house knowing. Not impressed? Try having an alarm system of three dogs assuming since I’m ... Read
  • September 12, 2013
    Soon your mobile will be your assistant, best friend and wingman all rolled into one When I was a kid, the last word from my mother’s mouth before we went anywhere was invariably “behave.” “Behave” of course meant different things based on where we were going and what we were doing — shopping (no hiding in the ... Read
  • August 28, 2013
    AirPatrol and MobileIron team up to deliver location-based enterprise mobile security. The problem with static policies for mobile devices is the devices are constantly moving around — not static at all. The “one size fits all” approach isn’t the answer; mobile devices need dynamic mobile device policies – one appropriate for the user in the right ... Read
  • August 23, 2013
    One of the toughest questions about social media was how to make money off of it which led to Facebook introducing boosted posts, YouTube showing ads before a video, and sponsored tweets on Twitter. Then the question became, “So what about mobile?” Facebook’s experiment needed to work, and it did. In Q2 this year, 41% of ... Read
  • August 21, 2013
    SPOILER ALERT: Last weekend I saw “Paranoia” which has been described as an espionage and business competition drama surrounding a very cool, yet unrealistic, technology. I’m not a movie reviewer so I’ll leave that to the pros, but I do have something to say about the “unrealistic” technology. The first cool technology piece shown in the ... Read
  • August 13, 2013
    The age old saying of it’s not where you are but who you’re with is wrong. In today’s world of communication, people are constantly updating their friends, family and strangers on minute details of their lives from a filtered image of a breakfast bagel to 140 character opinions on athlete’s attire. But always included in ... Read
  • August 7, 2013
    After denying an invitation to join a group’s tee-time and entering the building through the service entrance, I finally found the breakfast buffet (bacon, eggs, bacon, fruit, bacon) and mobile cyber security discussion. The Mobile Intelligence and Application Security Symposium was hosted by AMP Technology Solutions and the Retired Navy Commander and POW, the Honorable Everett ... Read
  • August 1, 2013
    And with one phrase, Gartner struck fear into the hearts of MDM companies around the globe: “Mobile Device Management Won’t Last.” Of course, security experts just nodded and continued on with their days because we know there isn’t a one size fixes all solution when it comes to mobile security. MDM isn’t an exception. However, this ... Read
  • August 1, 2013
    Cybersecurity firm to move headquarters from Columbia to Fulton Baltimore Sun staff, 6:54 p.m. EDT, July 31, 2013 – AirPatrol Corp., a Columbia-based cybersecurity firm that focuses on wireless and mobile systems, will relocate its headquarters to Maple Lawn Corporate Center park in Howard County and expand, the Howard County Economic Development Authority announced late Wednesday. The growing company’s offices ... Read
  • August 1, 2013
    Columbia, MD (July 31, 2013) – Howard County Economic Development Authority (HCEDA) is pleased to announce that AirPatrol Corporation has decided to expand and relocate its corporate headquarters to St. John Properties’ Maple Lawn Corporate Center park in Howard County. The company chose Howard County after considering options that included other locations in Maryland and ... Read
  • July 30, 2013
    Recently, Microsoft launched “Lab of Things” – a cloud-based framework that links to the company’s HomeOS, which monitors and controls connected devices inside home environments. Part of the HomeOS is the HomeStore which acts as an application, drivers, and device store. This could make it so that one platform controls all the automated devices in ... Read
  • July 23, 2013
    When two become one. Get out of my head. I can read your mind. I know you. Yes, these are quotes from a movie I saw over the weekend but it wasn’t a sappy love story. It was a story of humans partnered with machines vs. aliens and I kept thinking of where technology is heading instead ... Read
  • July 19, 2013
    This week, Google killed Latitude (a location app that allowed people to let others know where they were through GPS) and suggested users use the Android Google+ app to share locations, soon be available on iOS. Shutting down Latitude didn’t get as much public attention as some other location based services decisions the industry giant made ... Read
  • July 11, 2013
    Although many companies are jumping on board for BYOD (Bring Your Own Device), many are still hesitating and have an overall resistance toward changing the corporate culture to one that is more mobile friendly. Intel is one such company that resisted moving towards mobile but is now embracing mobile so thoroughly and so quickly that Intel may ... Read
  • June 24, 2013
    Thursday, AirPatrol Corporation was recognized by AFCEA DC as an emerging technology and highlighted at the conference when Cleve Adams, CEO addressed the audience shortly after the lunch keynote speaker. An audience of industry leaders and federal decision makers, most ideas discussed centered around cybersecurity, policy creation, and mobile device integration within agencies. Throughout presentations, frustration ... Read
  • June 19, 2013
    Silicon Valley has been abuzz with deciding on the “next big thing” at Bloomberg’s event for the past two days and they’ve decided on “contextually aware applications.” Well, of course it is. The first level of context aware or context based mobility is in location – one of the hottest topics of 2013, both indoor (Apple ... Read
  • June 13, 2013
    100% growth seems unusual when discussing tech advancements but it’s now the global norm. In fact, we are expected to have two billion active smartphones and tablets next year. This is important when we ask what will these two billion mobiles devices be doing? With billions of mobile devices, the mobile ecosystem will drastically change. Currently, ... Read
  • June 10, 2013
    The cybersecurity industry continues to address cyber issues as a new type of problem, that never before have we addressed an issue that is so hard to define, control, and predict. True, cyber is international and difficult to track but we’ve been here before, we can handle this. Cybersecurity doesn’t need to be the next ... Read
  • June 7, 2013
    We’re half way through 2013 and mobile has continued to grow exponentially. I could start off with some ideas that everyone already knows: mobility is changing everything, mobility is growing at a rate unseen before now, Apple dominates the tablet industry, PCs (and Microsoft) are on their way out, and people use their mobile phones ... Read
  • June 6, 2013
    One of the biggest obstacles in cybersecurity is measuring its ROI, its effectiveness, its worth. This isn’t because the value of cybersecurity is in question but because it is difficult to hypothesize what the worth of a data loss can be such as someone’s personal records. This has changed a bit now. A hospital mentioned in ... Read
  • June 4, 2013
    There is massive hype around BYOD. Additional definitions like Bring Your Own Disaster add more to the FUD (Fear, Uncertainty and Doubt) quality of the acronym. Because it’s painted as such a dangerous phenomenon, enterprises may assume it’s overhyped and ignore it. In a ComputerWorld interview, Paul Luehr, former federal prosecutor and supervisor of the Internet ... Read
  • May 31, 2013
    Recently, two new sets of guidelines were released regarding mobile security and mobile locationing. White House Announces Mobile Security Guidelines. The guidelines include a baseline of standard security requirements for mobile computing, a mobile computing decision framework for federal agencies and a mobile security reference architecture. Created through active roles of DHS, DoD, and NIST, these guidelines are an important step ... Read
  • May 28, 2013
    Right before Memorial Day Weekend kicked off, the US government came out with a claim that hackers originating in Iran have increased attacks on US cyber networks. Some hack attempts were so powerful that they attempted to control and manipulate the flow of oil and gas in the country. I refer to this and other similar ... Read
  • May 22, 2013
    It’s the middle of day two of CTIA Wireless and I am beginning to see similarities between it and the Preakness last weekend. Decked out in fancy hats or ninja costumes, we’re all betting in hopes that the bet will save the day (ie. cover the Black Eyed Susan bar tab, buy your next house, ... Read
  • May 20, 2013
    If you didn’t know already, AirPatrol Corporation will be exhibiting and presenting at the CTIA Wireless 2013 event this week in Las Vegas. Our booth is 3729R and I speak at the Exhibits Innovation Stage, Booth 5646 on Wednesday May 21 at 12:00pm – it’s a short presentation on AirPatrol and our capabilities so err ... Read
  • May 13, 2013
    We know that the weakest links in security are people, the individuals that use programs, devices, etc. on a daily basis to do anything and everything. Even the savvy fall to malware, hackers, or a poorly timed mouse click. So we protect against ourselves. We have virus protection at home, advanced firewalls and security procedures and ... Read
  • May 9, 2013
    Teamed up with NASA’s Landsat program, Google has released time lapse imaging from 1984 to 2012. Landsat is a series of satellites that perpetually orbit the planet and, unlike most monitoring programs, these satellites look down instead of out. The story is best told by TIME: http://world.time.com/timelapse/. Highlights of the imagery include: Columbia Glacier Retreat, Alaska Wyoming Coal ... Read
  • May 3, 2013
    “As the White House moves to confront China over its theft of U.S. technology through hacking, policy makers are faced with the question of how much damage has already been done. During their multiyear assault on defense contractors, the spies stole several terabytes — equal to hundreds of millions of pages –of documents and data ... Read
  • May 2, 2013
    Location was the basis for mobility. The first reason we created mobile phones was so we could be located anywhere and actively communicate. Then we wanted GPS on our phones so we could see where we were and how to get somewhere else (Magellan just released SmartGPS). Now we want special information and capabilities based ... Read
  • April 24, 2013
    Google just came out and said their newest product, Google Glass, won’t be publicly available until 2014. There hasn’t been much public outrage about this yet, possibly because potential Google Glass customers are just accepting it and moving on with their day. It’s been said before, but the way Google has marketed Glass has been very ... Read
  • April 22, 2013
    Our cell phones are capable of carrying out orders that we do not ask of them. Siri regularly helps out by answering our direct questions, but these miniature computers are constantly interacting with the environment around us. The information gained through location, user role, past purchases, Facebook likes and more is regularly being tabulated and ... Read
  • April 22, 2013
    My thoughts and prayers are with those affected by the events last week in Boston and West, Texas. The bravery shown by those who raced towards the explosions, the first responders, and those that patrolled the streets of a shutdown city is beyond admirable. Thank you. Even after we have figured out who and why, the ... Read
  • April 16, 2013
    Yesterday, AirPatrol Corporation was invited to attend the NCCoE (National Cybersecurity Center of Excellence) for the NCEP (National Cybersecurity Excellence Partnership) signing ceremony. Also attending the event were US Senator Barbara Mikulski, Maryland Governor Martin O’Malley, Montgomery County Executive Ike Leggett, and National Security Agency Director General Keith Alexander. These leaders in cybersecurity and policy expressed ... Read
  • April 12, 2013
    NIST (National Institute of Science and Technology) is rolling up their sleeves and diving into comment submissions for the Cybersecurity Framework called for in the president’s cybersecurity executive order signed eight weeks ago. You can read the variety of comments submitted from private industry, individuals, government and more. It’s no secret that the government is trailing behind ... Read
  • April 10, 2013
    I’ve been waiting for years and it’s almost here – the day when two of my passions collide. Baseball, meet technology. Umpire, the heckling may stop here. We live in an Internet of Things world, where sensors are a part of everything and the amount of information collected and recorded is massive. Unlike the human eye, ... Read
  • April 4, 2013
    The Army and the healthcare industry have come out with reports this week that show that while they are ahead of the times in getting mobility out and in use, they might not be doing it as safely as they should. They say you can’t fix stupid, but is it true? Take a minute to look ... Read
  • March 29, 2013
    One of the best and most impressive traits of research analysts is that they are pretty darn good at predicting the past. As for foreseeing the future, well, that is a far rarer ability. I was reminded of this troubling truth last week when I took a quick call from a research analyst who was ... Read
  • March 27, 2013
    Following up on my blog from Friday, Apple’s acquisition of WiFiSlam is getting a lot of attention this week. In a nutshell, WiFiSlam specializes in a technology that allows mobile apps to pinpoint users’ locations through the interaction between their smartphones and standard wifi signals – no GPS need apply. It’s rumored to be a ... Read
  • March 25, 2013
    Between the increasing amount of snow on the ground and a Cinderella school called FGCU ruining brackets from coast to coast, Monday is hitting with full force. But ruining is a strong word and I admire them emerging from a red sea of college basketball madness into a clear blue. It’s as if the mobile security ... Read
  • March 22, 2013
    Although I was unable to attend the ITSEF 2013 (IT Security Entrepreneurs’ Forum) this week in Palo Alto, I read a review that hit home: “Mobile security today resembles the early days of PC security in its need to understand operating systems and applications, and to apply low-level controls. But it’s different in that it deals ... Read
  • March 19, 2013
    Congratulations to the AirPatrol team for winning the Chesapeake Regional Tech Council’s Innovator Award! The award ceremony last Thursday was an honor to attend with everything from interesting sponsor vendor tables, delicious food, amusing entertainment videos and honorable presenters. The Innovator Award is given to the company that best exemplifies the entrepreneurship and innovative style it ... Read
  • March 14, 2013
    It’s almost been a year since Google announced “Project Glass” and we still can’t buy it. In what seems to be very Apple-esque, Google won’t tell us when it will be available but they did take $1,500 deposits last year. Last month, Google hacked our imaginations when #ifihadglass was trending with users vying for a ... Read
  • February 28, 2013
    Mobile World Congress and RSA have notoriously been during the same week each year, meaning companies spend their entire yearly event budget over five days. Wondering why, I was curious how RSA compared to MWC this year. In short, MWC releases new phones, tablets, etc. and then RSA tries to figure out how to secure all ... Read
  • February 22, 2013
    Next week there will be thousands of members of the technology and cybersecurity clan heading to San Francisco to invade the Moscone Center and, maybe just as importantly, the W after various vendor parties. The RSA expo floor has expanded this year to include even more companies, flashy devices and scary security scenarios. We’ve all done ... Read
  • February 13, 2013
    “We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.” – President Obama, State of the Union, February 12, 2013 Yesterday, President Obama signed an Executive Order called “Improving Critical Infrastructure CyberSecurity” (you can see the actual order here). The 8-page ... Read
  • February 11, 2013
    For years, Apple Mac users would say they didn’t need anti-virus protection on their computers because they “couldn’t get a virus.” Just last year, this changed and Apple tweaked their language from “doesn’t get PC viruses” to “it’s built to be safe.” This may seem absurd, that people thought they were above a malicious act happening ... Read
  • February 8, 2013
    It used to be simple: Macs and iPhones were personal, Blackberry and Microsoft were business. However, with BYOD and an influx of mobile device options, this line is near invisible. Proof: Gartner predicts that by 2014, Apple Macs will be as accepted by enterprise IT as Microsoft PCs are today. These consumers are pushing the BYOD trend ... Read
  • February 6, 2013
    It’s no secret, wireless technologies have become the de facto network access method for many enterprise users with smartphones and tablets leading the way as the tools of choice when it comes to collaboration and productivity. It’s essential to remember that many times the purpose of the 802.11 WLAN is to serve as a portal ... Read
  • February 4, 2013
    It might seem a little far-fetched, but stick with me here. If your eyes had returned to a non-blurry field of vision after watching the highest rated ad during the Super Bowl last night, you can recall that there was a 34 minute blackout at the stadium where all play was forced to stop. If the ... Read
  • January 30, 2013
    What started as a sexting phenomenon has now made its way into the enterprise security world. No, really. SnapChat started making waves with the media when it was recognized for its ability to send photos between mobile devices which would expire in a specified time. It’s supposed to be copy-proof, no screenshots, no saving, no forwarding, ... Read
  • January 28, 2013
    In a recent talk at the DLD conference, the new COO of Yahoo! (and ex-Googler), Henrique de Castro, provided some very interesting perspective into his vision for Yahoo in the years to come. To quote him, “The future of the web is going to be completely different from what it is today.” Specifically, de Castro ... Read
  • January 23, 2013
    Not too long ago, we all had one and some of us could use the tiny QWERTY keyboard with scary speed. They were issued to us and we could check our corporate email 24 hours a day, every day of the week. Text messaging was a thing of the past and BBM took over with ... Read
  • January 15, 2013
    Although I wasn’t at CES last week, I believe I can experience the show without the hassle of airfare and hotels. There are lists-a-plenty of the Top 10 Best, Top 10 Worst, and even a four sentence summary of the event. What hasn’t mildly surprised me: Mobility is big. Phablets are bigger. “The Internet of Things” ... Read
  • January 7, 2013
    It’s the beginning of a new year which means we survived the Mayan apocalypse, the American fiscal cliff, and our families during the holiday season. Our next big thing to survive: mobility. Our inboxes are full of predictions for 2013. The idea is if we are able to predict what 2013 will bring, then we can ... Read
  • November 7, 2012
    Don’t worry – we’re redesigning the website and it will be up and running before you know it! Stay tuned. Read
  • October 9, 2012
    05 October 2012 American think tanks are becoming a big intelligence target for hackers from China and other countries. He told USA Today that it amounts to a “furious wave of cyber-espionage” targeted against government-related infrastructure as the attackers attempt to gain information on everything from “policy deliberations and pending litigation to national defense and private product development.”ording to Rep. ... Read
  • October 5, 2012
    Cellphone valets newest fad for some NYC teens NEW YORK – Thousands of teenagers who can’t take their cellphones to school have another option, courtesy of a burgeoning industry of sorts in always-enterprising New York City: paying a dollar a day to leave it in a truck that’s parked nearby. Students might resent an expense that adds ... Read
  • October 1, 2012
    U.S. Is Losing Cyber Espionage War’: HPSCI Chair Rogers “We are running out of time on this,” Rep. Mike Rogers, respected for working closely with his ranking member, said in a speech at today’s Intelligence and National Security Alliance‘s (INSA) cyber conference here.espionage war” against China, Russia and other countries, but even in the face of such a grave ... Read
  • September 28, 2012
    Industry and Federal Government Leaders Collaborate to Defeat Cybersecurity Threats COLUMBIA, MD–(Marketwire – Sep 27, 2012) – AirPatrol, a leading provider of advanced mobile device security systems, today announced it has been selected as a SINET 16 Innovator. AirPatrol will present its enterprise mobile device security solution during the 2012 SINET Showcase to be held October 25th at the National ... Read
  • September 20, 2012
    The Chairman of one of our favorite partners, Mobile Active Defense aka MAD, speaks on mobile security and how just using MDM does not provide your enterprise with the security you need. Great job, Winn!! MDM is not mobile security I take to task the unfortunate catch-all mobile acronym, MDM (Mobile Device Management) that is the current ... Read
  • September 4, 2012
    Isn’t technology incredible? The future is here. Here’s an interesting article about the self-driving cars from TechCrunch. From this article “Google’s Self-Driving Cars Complete 300K Miles Without Accident, Deemed Ready For Commuting,” the article mentions that there have been accidents in the past regarding these self-driving cars but it was while PEOPLE were in control of them! This reminds ... Read
  • August 29, 2012
    INDIANAPOLIS (AP) — A drug ring that two Indiana inmates allegedly ran behind bars using cellphones to orchestrate drug purchases and sales shows the risks posed by the widespread problem of the phones being smuggled into the nation’s prisons, officials said. Contraband cellphones are so common that even Charles Manson, one of the nation’s most notorious ... Read
  • August 29, 2012
    AirPatrol Corporation Appoints Cleve Adams Chief Executive Officer Mobile and wireless security developer taps seasoned technology executive to head firm’s global operations MarketWire Link COLUMBIA, MD – AirPatrol Corporation, a developer of advanced mobile device security systems, today named Cleve Adams as its chief executive officer. Adams is a seasoned technology executive with more than 25 years of ... Read
  • August 29, 2012
    BOSTON (AP) — The Transportation Security Administration has moved to fire six bag-screeners and suspend 14 others at Logan International Airport in Boston for performing inadequate luggage checks, some because they were distracted by their cellphones or other electronic devices. The moves were prompted by a routine audit that showed some officers were not paying close ... Read
  • August 27, 2012
    Last week, news about Prince Harry partying it up in Las Vegas au naturale hit the internet like a tsunami. If you have been able to ignore Page Six or others like it in the past week, congratulations and here’s what happened: Prince Harry had some girls in his room and played “strip pool” with them. ... Read
  • August 27, 2012
    In case you can’t read the article to the right: “Two inmates housed at different prisons used cellphones smuggled in by guards to run a drug ring that distributed methamphetamine and heroin, according to a federal indictment that charges 40 people in connection with the scheme. Prosecutors allege that the purported ringleader, Oscar Perez, and Justin ... Read
  • August 24, 2012
    By Luke Fretwell · Thursday, August 23rd, 2012 The federal government released the first iteration of its “Bring Your Own Device” toolkit that gives agency guidance on how to best empower employees to leverage their own personal devices to better serve citizens “anywhere, anytime” while still adhering to established security and records requirements. The BYOD kit, developed jointly by ... Read
  • August 3, 2012
    Mark Mills, CEO of the Digital Power Group (a technology and investment advisory firm), was featured on Fox Business regarding the United States and Energy. In this 5 minute video, his stance on America’s energy position in regards to the Middle East is discussed as well as where he sees us in the future. Mark discusses ... Read
  • July 25, 2012
    Credits to ZDNET – http://www.zdnet.com/infographic-the-ten-things-we-fear-and-love-about-byod-7000000899/ Read
  • July 23, 2012
    In this crazy video, we see a cell phone start an explosion in an oil tanker. Cell Phone Causes Explosion In the YouTube video, the following is described: “According to an email released by the South African Flameproof Association, this is what happened: The lorry is driven into the correct position in the loading bay. The re-fueller, in white overalls, ... Read
  • July 11, 2012
    In an article from Reuters today, “FBI warned US Labor Department data might be leaked-report,” discussed the security precautions that have taken effect for the release of market data to the press. After reading the article, I realized we have written a case study for this EXACT situation months ago. Here it is: Use Case: Market ... Read
  • July 10, 2012
    AirPatrol is happy to congratulate Advisory Board Member,  Chuck Brooks, on the recent formation of Brooks Consulting International! A valued member of AirPatrol’s board, Chuck is especially very active in promoting his interests and those companies that he is a part of through social media. Below is a listing of what Chuck can bring to ... Read
  • July 10, 2012
    Last night on CNBC’s Investigations, Inc., Dmitri Alperovitch discussed cyber espionage with the hosts. CTO and a founder of CrowdStrike, Dmitri summarized the situation by saying, “There are two kinds of companies left in America that have intellectual property: those that have been hacked and know and those that have been hacked and don’t know ... Read
  • July 9, 2012
    Joel Brenner is out with “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare.”  This is an important read as the author knows what he is talking about. Joel has served as the head of U.S. Counterintelligence under the Director of National Intelligence, responsible for integrating activities of departments and agencies ... Read
  • April 24, 2012
    Continued series from the Swift Exchange event in DC on April 11th. I’d like to specially thank Steve Chabinsky, Deputy Assistant Director of the FBI’s cyber division for starting this discussion. As discussed in the last blog, securing cyber space can endanger the free flow of information but we must discover and implement ways to globally collaborate around new ... Read
  • April 19, 2012
    Last week I was fortunate enough to attend a Cyber Exchange hosted by Swift Exchange. The event in DC had an impressive list of speakers, panelists and attendees to discuss domestic and international cyber, privacy issues involving cyber, defense options and future trends. This will lead to a series of blog posts. Three big ideas: A cyber war is eminent. The ... Read
  • January 24, 2012
    “After a security breach at the United States Chamber of Commerce last year, the Chamber discovered that its office printer, and even a thermostat in a Chamber-owned apartment, had been communicating with an Internet address in China.” – NY Times This is a scary example of unknowingly transmitting information to an outside location.  However, it’s not alone. Earlier ... Read
  • December 29, 2011
    Guess what?  Bionic man is alive and he’s in the form of millions of people surrounding you.  Scared?  Don’t be; you’re one too. People often joke that they could not pry their teenager’s iPhone out of his or her hands if their life depended on it.  This is met with understanding laughs but we aren’t really ... Read
  • December 6, 2011
    As we hear the drone of commentary regarding the advanced persistent threat, we must come to appreciate that these attacks are nothing new.   The APT, aka digital insider, is merely the natural evolution of tradecraft and criminality.  The arms bazaar of the internet has leveraged asymmetrical capabilities to the masses. The hackers and traditional miscreants will ... Read
  • November 22, 2011
    One of the best business books I have had the pleasure of reading is, not surprising, Good to Great by Jim Collins. In the book, Collins and his colleagues outline the key aspects that take a company from just being ‘good’ to true ‘great’ success. Several of his analogies stuck with me through the years ... Read
  • November 15, 2011
    The ability to change what you can do depending on where you are or who you’re with is something we all wish we could do.  If you walked into a room where no one spoke your language, wouldn’t you love the ability to suddenly speak the common language?  Wouldn’t you love to know what you ... Read
  • October 27, 2011
    Nearly a decade ago, the Chubb Group of Insurance Companies noted a developing trend and, in response, developed one of the first cyber security insurance products. As a leader in this industry, Chubb has continued to respond to the changing landscape. Now, due to the explosion of corporate smartphones and PDAs, Chubb will support the ... Read
  • October 11, 2011
    Our country is hemorrhaging a library of congress of data every week. One terabyte of data is exfiltrated from our networks weekly, by both state and non-state actors. Private Manning – Mr. Assange’s mule –  facilitated the WikiLeaks fiasco (http://wikileaks.org).  In case you have been traveling in Timbuktu, Wikileaks ushered in the new anarchy movement. Since Private ... Read
  • October 6, 2011
    “You can’t connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future.” – Steve Jobs The passing of Steve Jobs yesterday, October 5th, is a moment to be marked in entrepreneur and innovation’s history.  Learning the news last night, his ... Read
  • September 30, 2011
    One of the most gratifying experiences any new parent goes through is the personal growth and change that comes into one’s life alongside the new born. Over the 6 weeks that have passed since the launch of ZoneDefense into the world, we have all been transformed significantly. New realizations have dawned on us as we were talking to ... Read
  • August 16, 2011
    Today we launched ZoneDefense, AirPatrol’s latest product offering. As the first and only intelligent enterprise mobility solution, AirPatrol’s ZoneDefense continuously monitors mobile devices and alters their capabilities according to the situation. Government organizations and global enterprises count on AirPatrol to empower mobile worker productivity and protect the organization’s assets. I wanted to share here some of ... Read
  • August 9, 2011
    According to the SAIC/McAfee study, there will be 1.8 billion smartphones by 2013.  According to Trusteer, 1 in 20 mobile devices will be compromised by 2012.  That means there is an estimated 90 million mobile devices that will be compromised in 2013. 90 million.  That’s how much Manning will make in the next 5 years.  That’s ... Read
  • August 8, 2011
    Robust security practices nearly always require a physical mechanism which monitors the zone or system being protected and physically verifies the presence or absence of a threat. Surprisingly, today’s security policies governing the usage of Personal Electronic Devices (PED) and mobile devices within our most secure government and financial facilities do not require a physical monitoring ... Read
  • August 2, 2011
    The hostile nature of the Internet is highlighted by foreboding trends.  The FBI’s top criminal priority is cybercrime. According to the Department of Justice, two out of three U.S. companies have been impacted by cybercrime. The GAO has estimated that losses in excess of $50B have been sustained due to industrial cyber espionage. The British government noted ... Read
  • July 28, 2011
    We are now mere weeks away from the launch of AirPatrol’s revolutionary new product – ZoneDefense™. ZoneDefense will be the first and only intelligent enterprise mobility solution, which would continuously monitor mobile devices and alter their capabilities according to the situation. Putting it in other words, ZoneDefense is the first ever location-aware, indoor and outdoor, context-aware enterprise ... Read
  • July 13, 2011
    Cyberspace is no longer the sole dominion of nation states and corporations.  Hacker crews have been joined by hacktivists, lone wolves and journalists in the quest for the iron throne- “omniscience.” In a world of tablets, laptops and smart phones, the recent story regarding News International’s and their parent company’s, News Corporation, use of hacking for ... Read
  • July 7, 2011
    “To every action there is always an equal and opposite reaction.” – Newton’s Third Law Unless you have unplugged yourself from any source of media this past week, you have heard about the passionate Casey Anthony case. Forever immortalized in the world of today’s go-to encyclopedia, Wikipedia, the case had the nation glued to see what ... Read
  • June 27, 2011
    One of the most intriguing and thought-provoking philosophers of all times (and a personal favorite) is David Hume. I still remember my shock while sitting in epistemology class, 15 years ago, when the professor summed up a key tenet of his theory eliminating the concept of causation. According to Hume, we reason inductively by associating constantly ... Read
  • June 14, 2011
    As our network security architectures have improved, hackers are bypassing our moats and gates by flying over the castle walls. With the consumerization of IT and the subsequent dramatic uptick in personal mobile devices being brought onto our campuses, corporations must create a sustainable mobile risk management policy. Managing the risk posed by smart-phones and other ... Read
  • June 10, 2011
    It’s surprising how quickly we get comfortable with our new mobile devices … and how quickly they can seem ‘old’. Although I got my 4G Android only several months ago, it feels like I’ve had it much longer. And my first iPhone, purchased about 3 years ago, already seems like it is from another era. While ... Read
  • June 4, 2011
    The internet, in its ever-changing landscape, is about to go through yet another transformative phase. This incarnation can best be described by just two terms: Personal and Mobil. We will now witness heretofore unimaginable utility when contextual information, with location as its bedrock, is integrated with mobility. It was the famous philosopher Immanuel Kant who suggested ... Read
  • May 26, 2011
    The acceleration of the consumerization of IT has ushered in a new epoch in human history. Not since the advent of the wheel has civilization been altered so dramatically. We all enjoy the mobile cyber experience but we must appreciate that there is a dark side to convergence. As Cyberspace merges with the real world via ... Read
  • April 25, 2011
    When Guglielmo Marconi first demonstrated wireless telegraphy in 1896, he probably did not foresee an era when the telephone would be wireless and subsequently utilized to facilitate global commerce. According to Gartner, the world is expected to have over 1.8 billion smartphones by 2013. Wireless and mobile computing represent the true convergence of cyberspace and the ... Read