Quantcast
Channel: Industries – Identity Week
Browsing all 23 articles
Browse latest View live

University Medical Center Hamburg-Eppendorf Scores European Identity Award

Congratulations to our customer University Medical Center Hamburg-Eppendorf (UKE), who was named a winner of the European Identity & Cloud Awards 2013 for Best Approach on Improving Governance and...

View Article



Government Information Security in the Age of Sequester

While meeting with a couple of my regular contacts at a recent AFCEA event, their conversation veered sharply from their normal assessments of cyber attacks into today’s prevalent motif of Beltway...

View Article

Banking and the Cloud

A trend that has caught the attention of some in the technology media is the reluctance of banks to move to the cloud, despite the benefits. The reason is that over the past 15 years banks, to a large...

View Article

Lax Retail IT Security Exposes Customer Data

I think that most consumers would be horrified with the general state of retail IT security – especially given that these companies handle millions of payment card transaction daily, and collect a...

View Article

JPMorgan Breach Hints at Financial Sector Bombardment

JPMorgan’s cryptic disclosure that hackers compromised the data of more than 76 million of its consumer patrons -- and 7 million small business clients -- may seem stunning. But it reflects just a...

View Article


Here’s How to Own the Critical National Infrastructure of a Country

It’s simple for intruders to obtain a list of weak systems from Showdan with a credit card. From there they can take over CNI systems using well known exploits, or powerful and secret zero day attacks...

View Article

Banks or Retailers, Who Should Pay the Bill for Data Breaches?

The retailers that have suffered data breaches (repeatedly, in some cases) have wretched to non-existent IT security and little to no regard for the personal information of their customers. The post...

View Article

The Annual Holiday Season IT Implementation Freeze

Criminal hackers and nation-state attackers don’t care what time of year it is. They won’t respect your IT freeze, so continuous security improvement and continuous compliance needs to occur 365 days a...

View Article


Force Majeure – Cyber Security Insurance

As we look back on the cyber attacks of the past year, one of the recurring themes was that there was no way the hacked companies could have expected or prevented the attacks that hit them. In legal...

View Article


Data Breach at US Office of Personnel Management Reveals Intent of...

On the surface, last week’s data breach at the US Office of Personnel Management (OPM) might seem like just another cyber attack, like those which affected Target, Home Depot and many others. However,...

View Article

JPMorgan Chase and the Need for Military-Level Security

Financial services security must now be built and operated at the level of national defense and military-level security; commercial compliance and mitigation are no longer effective strategies. The...

View Article

Securing a Dynamic Network

Whenever new computers and applications are deployed on a network, they can introduce unforeseen security risks. Shared and default privileged account passwords are introduced through deployment...

View Article

NCCoE’s Cyber Security Guidelines for Electric Utilities Are A Good Start

The National Cybersecurity Center of Excellence’s (NCCoE) recent cyber security guide Identity and Access Management for Electric Utilities identified a serious security concern within the energy...

View Article


Government Information Security in the Age of Sequester

While meeting with a couple of my regular contacts at a recent AFCEA event, their conversation veered sharply from their normal assessments of cyber attacks into today’s prevalent motif of Beltway...

View Article

The Annual Holiday Season IT Implementation Freeze

Criminal hackers and nation-state attackers don’t care what time of year it is. They won’t respect your IT freeze, so continuous security improvement and continuous compliance needs to occur 365 days a...

View Article


Guarding Against Spear Phishing Threats

IT security staff at these agencies are on guard against the now pervasive tactic of spear-phishing. In this targeted social engineering attack, hackers use emails that masquerade as trusted...

View Article

Cyber Security Insurance is No Substitute for Good IT Security Practices

Cyber security insurance will never pay off for the purchaser because it does not replace proper security or internal IT controls. The post Cyber Security Insurance is No Substitute for Good IT...

View Article


Are You Ready for PCI-DSS 3.2?

There are a number of significant changes in PCI-DSS 3.2. We’ll just take a look at the new aspects that directly affect security controls. Here are the highlights of those new requirements. The post...

View Article

Nation-States and Data Breaches

Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get...

View Article

About This Week’s WikiLeaks CIA Hacking Disclosure…

This week’s sensational Wikileaks revelations about CIA hacking tools has raised all sorts of questions about the US intelligence agency’s hacking arsenal. Here’s my take on the matter. The post About...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images