About Us | Contact Us
View Cart
Archive for 'Access Management' Category

T7: The Trend of Trends 2019

By Vigilize - Last updated: Monday, February 11, 2019

The seven best trend articles inĀ 2019 . . . For ISOs of small financial institutions. While it may not feel like it yet for some of us, we’re well on our way into 2019, and that means it’s time for the last of our annual articles looking at predictions and trends in information technology. Previously, […]


The Risk of Convenience

By Vigilize - Last updated: Thursday, August 16, 2018

Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]


The 12 Billion Dollar Scam

By Vigilize - Last updated: Sunday, July 22, 2018

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our […]


New Bill Adds Industrial Control Systems to Homeland Security’s Oversight

By Vigilize - Last updated: Sunday, July 15, 2018

While already happening in practice, the new legislation would officially make it one of the agency’s priorities. An article review. In an acknowledgment of what is recognized as a growing threat, legislation introduced recently in the House of Representatives would officially add industrial control systems to the Department of Homeland Security’s cybersecurity priorities. The bill, […]


Don’t Believe Your Eyes: Router-Based Malware Can Change Website Data

By Vigilize - Last updated: Sunday, June 10, 2018

Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data in transit and change what you see on your screen. An article review. Initially, researchers thought that a new piece of router-based malware called VPNFilter was a relatively simple tool for directing and implementing a distributed denial of service (DDoS) attack. […]


Project Indigo: Blurring The Lines Between Government and Private Sector Cybersecurity

By Vigilize - Last updated: Sunday, May 27, 2018

US Cyber Command joins with the FS-ISAC to share threat intelligence… An article review. Threat intelligence sharing is a concept we’re all probably familiar with, at least in passing–it’s hard to imagine where we’d be without the efforts of organizations that work to identify and communicate new and developing threats! However, until relatively recently those […]


The Cost of Being Unprepared

By Vigilize - Last updated: Monday, April 30, 2018

A new study has identified the most profitable malware, showing just how much unprepared businesses have paid. An article review. Despite pleas from various experts and authorities, it looks like a significant number of organizations ultimately decide to pay the criminal organizations who have held their data hostage. That’s something that many people have probably […]


How Well Do You Know Your Endpoints?

By Vigilize - Last updated: Sunday, April 22, 2018

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically update and move on. That kind of hands-off approach has never ensured […]


Temporary Passwords: A Potential Weak Link

By Vigilize - Last updated: Monday, April 16, 2018

Some small organizations continue to use customer data to generate initial passwords, despite the risks. An article review. When rolling out a new online banking platform organizations are often faced with the task of issuing new usernames and passwords to existing users, but how they choose to do that can have a big impact on […]


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway - Last updated: Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]