Jack Poller

Founder & Principal Analyst, Paradigm Technica, covering Security, Cloud, and AI; former marketer, SW & HW Eng; Firearms Instructor & FFL, photographer, auto racer

2025-04-16

Read the full article to discover how Badge makes authentication seamless, secure, & invisible. I'd love your thoughts on this approach to solving one of cybersecurity's most persistent problems.

linkedin.com/pulse/reinventing

#Cybersecurity #IdentitySecurity #Passwordless #Innovation #TechLeadership
5/5

2025-04-16

It's a complete paradigm shift that works with your existing infrastructure while eliminating credential theft, simplifying compliance, and providing seamless user experience across all devices.
The question isn't "Can we afford to adopt this?" but rather "Can we afford not to?"
4/5

2025-04-16

Badge has solved what cryptographers couldn't for 20 years - truly secretless authentication that generates cryptographic keys on-demand from your biometrics, then discards them. Nothing stored means nothing to steal.
This isn't incremental improvement.
3/5

2025-04-16

In a world where:
🔑 81% of breaches involve stolen credentials
💰 $9.5 trillion is lost annually to cybercrime
👤 Traditional biometrics still create vulnerable digital replicas
2/5

2025-04-16

🧵Reinventing Identity Security: How Badge is Building a Passwordless Future

I'm excited to share my latest article exploring how Badge is transforming cybersecurity with breakthrough “fuzzy extraction” technology.

1/5

2025-04-11

Read the full article to discover why organizations face a clear choice between infrastructure designed with bolted-on security versus systems where security and performance are integrated necessities.

5/6

2025-04-11

With AI workloads pushing computational boundaries and attackers growing more sophisticated, security can no longer be an afterthought—it must be foundational to your infrastructure strategy.
4/6

2025-04-11

🔐 Why edge computing creates unprecedented security vulnerabilities

🔄 How HPE's custom silicon and iLO7 technology creates an immutable security foundation

🔮 The importance of quantum-resistant cryptography (CNSA 2.0) for tomorrow's threats
3/6

2025-04-11

In my latest piece, I explore how HPE ProLiant servers have evolved to address both physical and logical security threats in this new frontier.
Key highlights:

2/6

2025-04-11

🧵I just published a new article on LinkedIn: "From Data Centers to the Edge: HPE ProLiant's Security Revolution for the AI Age"

As computational power moves beyond traditional data centers into edge environments, security challenges multiply exponentially.
1/6

2025-04-08

Are Servers Still Relevant in the Age of Cloud?

Check out this podcast with HPE where we discuss this...

techfieldday.com/2025/servers-

#TFDx #HPEProliant

2025-04-08

From HPE's perspective, the edge is anything not in a traditional data center.

#TFDX #HPEProliant

2025-04-08

HPE Proliant is focusing on supply chain security starting with custom silicon for a security enclave to build the root of trust and ensure integrity from point of manufacture.

We'll be diving into security at 1015 central. Stay Tuned

#TFDX #HPEProliant

2025-04-08

It's time - TechFieldDayX with HPE covering the Gen12 HPE Proliant is starting now.

Join on LinkedIn or techfieldday.com/event/tfdxhpe

#TFDX #HPEProliant

2025-04-07

It seems obvious that AI is a logical tool to attack social engineering attacks. And that's what Adaptive Security is providing: AI-driven risk scoring, security awareness training, and phishing simulations.

Adaptive Security just raised $43M funding.

siliconangle.com/2025/04/02/ad
3/3

2025-04-07

While security training is a necessary component, it's woefully insufficient to solve this problem. Don't believe me? Go talk to phishing expert Troy Hunt of Have I Been Pwned fame. If the best trained expert in the world gets phished, anyone and everyone can and will get phished.
2/3

2025-04-07

🧵As I explained in my recent article "The Hidden Danger of Phishing: Why Training Alone Won’t Save You," humans are naturally trusting and easily manipulated, making social engineering the easiest, fastest, and unfortunately, most common and most successful cyber-attack methodology.
1/3

2025-04-02

To further its mission "to safeguard the flow of data in the digital economy so that creators maintain ownership and attribution of their work," Cyberhaven just raised $100M at $1B valuation, joining the vaunted ranks of the cybersecurity unicorns.

finance.yahoo.com/news/cyberha
3/3

2025-04-02

Cyberhaven is attempting to rectify this issue with a data detection and response tool. Cyberhaven's DDR "finds and follows your sensitive data to protect it everywhere it goes, no matter what form it takes."
2/3

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst