Access Management

Bitlocker Attack Puts Data At Risk

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly sim...

Sign-In Kiosks May Be Putting You At Risk

New research reveals issues with these commonly overlooked devices… An article review. With computers involved in our lives and businesses in so many ways, it can seem like we’re always being warned of another overlooked device that is ready to wreak havoc. Wh...

T7: The Trend of Trends 2019

The seven best trend articles in 2019 . . . For ISOs of small financial institutions. While it may not feel like it yet for some of us, we’re well on our way into 2019, and that means it’s time for the last of our annual articles looking at predictions and tre...

The Risk of Convenience

Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and se...

The 12 Billion Dollar Scam

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget...

New Bill Adds Industrial Control Systems to Homeland Security’s Oversight

While already happening in practice, the new legislation would officially make it one of the agency’s priorities. An article review. In an acknowledgment of what is recognized as a growing threat, legislation introduced recently in the House of Representatives would...

Don’t Believe Your Eyes: Router-Based Malware Can Change Website Data

Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data in transit and change what you see on your screen. An article review. Initially, researchers thought that a new piece of router-based malware called VPNFilter was a relatively simple tool...

Project Indigo: Blurring The Lines Between Government and Private Sector Cybersecurity

US Cyber Command joins with the FS-ISAC to share threat intelligence… An article review. Threat intelligence sharing is a concept we’re all probably familiar with, at least in passing–it’s hard to imagine where we’d be without the efforts of ...

The Cost of Being Unprepared

A new study has identified the most profitable malware, showing just how much unprepared businesses have paid. An article review. Despite pleas from various experts and authorities, it looks like a significant number of organizations ultimately decide to pay the criminal ...

How Well Do You Know Your Endpoints?

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically u...