About Us | Contact Us
View Cart
Archive for 'Security Tools' Category

Cyber Challenge: A Community Bank Cyber Exercise

By Vigilize - Last updated: Sunday, July 29, 2018

The FDIC has released new training material to help small banks start a discussion on risk… An article review. Sometimes it can be difficult to find a starting point when getting your employees discussing risk and technology, and while we do provide our own resources on the subject we wanted to pass along another resource […]


Equifax Ordered To Implement Security Measures

By Vigilize - Last updated: Sunday, July 1, 2018

Financial regulators from eight states impose new rules in the wake of the credit reporting agency’s historic breach. An article review. The investigation by federal regulators and law enforcement officials into the breach that resulted in the release of over 140 million people’s personal information is still ongoing, but Equifax has already reached an agreement […]


Object Access Limitations

By Matt Jolley - Last updated: Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]


The Difference Between Patch and Vulnerability Management

By Vigilize - Last updated: Thursday, January 18, 2018

The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.


New York to Impose New Cybersecurity Regulations

By Vigilize - Last updated: Tuesday, March 14, 2017

The controversial new regulations are the first in the nation, and may not be the last… An article review. On March 1 New York State became the first in the nation to impose its own cybersecurity regulations on banking institutions. Though banking institutions have 180 days to come into compliance, there are complaints that the […]


FFIEC Issues a Revealing Cybersecurity Assessment Tool FAQ

By Vigilize - Last updated: Wednesday, October 26, 2016

Questions from vendor management to mitigating controls covered in the new document. An article review.   The FFIEC released a document earlier this month covering some of the most frequently asked questions surrounding the Cybersecurity Assessment Tool (CAT), and it’s certainly worth taking a look at as many of their answers are eye-opening! Many have wondered […]


One Step Closer to Secure Mobile Devices

By Chelsea Bill - Last updated: Tuesday, July 24, 2012

If you think you have a good patch management and verification program in place, think again! Sure, you’re supplementing WSUS with Nessus scans or some other third party patch verification process. But are you scanning your mobile devices?


FFIEC Implements New InfoBase Technology

By Vigilize - Last updated: Friday, May 4, 2012

The Federal Financial Institutions Examination Council (FFIEC) has announced that the organization has upgraded the functions and features of the InfoBase for the FFIEC Information Technology Examination Handbook (IT Handbook). The IT Handbook consists of 11 booklets covering a variety of technology and technology-related risk management guidance for financial institutions and examiners.


Third Party Patch Management

By Sean Waugh - Last updated: Wednesday, May 2, 2012

Vulnerabilities come in all shapes and sizes and while operating system patch management has largely been simplified with tools like WSUS, there is still a high degree of risk due to many popular third party applications and the lack of any centralized patching mechanism for maintaining those installations.  Vendors such as Adobe and Mozilla regularly release updates for their software packages, but managing those updates has been an arduous task for many system administrators.  Until recently, the only centralized option was to create your own MSI packages and deploy them via group policy or SCCM.


DNSChanger Malware

By Vigilize - Last updated: Monday, March 5, 2012

In November 2011, the FBI replaced rogue DNS servers with clean servers to prevent millions of Internet users infected with the DNSChanger malware from losing Internet connectivity when the members of a ring where arrested during Operation Ghost Click. However, the court order allowing the FBI to provide the clean servers is set to expire on March 8, 2012. Computers that are infected with the DNSChanger malware may lose Internet connectivity when these FBI servers are taken offline.