Access Management

Testing the Voice Cloning Threat

Establishing Voice Authentication Controls Meet my voice. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In a land not so far away, in a time, not so distant (actually, within the next month), there will be a kickoff ...

The Four Basic Truths of System Security

System Security and Cybersecurity are not the same thing. . . Another one of those Dan's New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

Eclipsing the Manifesto

Four disparate words With a number and a special character, for good measure Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Last week I posted a GPT summary of my infamous “Password manifesto.”   Today...

Retrospective: Password Aging

A look back at 2008 And a radical manifesto of the timer Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In 2008 I wrote an article, published in Hoosier Banker magazine, that we have since called “The Password Man...

The Importance of Proper Multi-Factor Authentication (MFA) in 2022

Not just because it is becoming an issue of compliance. . . We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a s...

Zeroing in on VPN Security

Has the security effectiveness of VPNs passed? Another Technical Article by Tanvee Dhir! Why under scrutiny? VPNs (Virtual Private Networks) have been a cardinal piece for secure internet browsing for decades. They offer a secure and encrypted tunnel to transfer your d...

An Overview of the FFIEC Architecture, Infrastructure, and Operations Booklet

Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It i...

Risk-Based Authentication Practices

A follow-up on Dan’s 2008 Password Manifesto On the NIST Publication on Digital Identity Guidelines Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In June 2017, NIST released a special publication on digital ident...

‘Disrupted’ Employees: The New Insider Threat?

Employees working from home may find it more difficult to follow security policies… An article review. The surge in employees working from home during the pandemic created many headaches for IT departments around the world, many of whom had no telecommuting polic...