Building a State-of-the-Art Security Team: Why the Channel Matters

Those of us in the security space are well aware of the changing marketplace. We’ve seen evolving and advancing threats, more hyper-connected business environments, increased regulations, and new technologies being adopted as a result. With this new landscape, how do businesses keep up and ensure their high-risk assets are protected? I wanted to call special…

Breaking the Value Ceiling

My team and I have been having many discussions lately on the evolution of GRC programs and the value of integrating or supplementing tangential processes with data flowing in and out of risk management activities.   Much of this discussion is fueled by the efforts we have had on the solution development front.  Over the past…

And the Debate Begins; is Biometrics a Necessary Evil?

Security researchers have been discussing biometrics for some time now, so it is not a new topic and the real-life implementations of biometric-based security solutions have been limited. Then comes Apple’s new iPhone 5S and all of a sudden biometrics becomes a mainstream technology, literally in the hands of millions of everyday users. Our own…

Aveksa CEO Explains What Gary Bettman Can’t

Hockey’s back! Ok, so it’s still preseason, and the return of the Bruins feels a little too soon after last season’s unceremonious end.  But, really, what else is going to occupy my time when the MLB season comes to a close in a little over a month, NFL games are regulated to only Mondays, Thursdays,…

iPhone Fingerprint Hacks Prove Continued Need for IAM

Well, that didn’t take long. Just a few days after Apple announced that their iPhone’s new fingerprint scanner would help strengthen the security of user’s mobile devices and allow for one-click iTunes store purchases, the legion of German hackers known as the Chaos Computer Club (CCC) successfully cracked the Touch ID technology. Stating on their…

At the ‘Heart’ of IAM

In 1903, the New York Police Department, the New York State Prison system, and the Federal Bureau of Prisons adapted forensic fingerprinting as a means of criminal identification, marking the first instance of widespread body-signature cataloguing in the United States. Over 150 years later, fictional Washington D.C. Precrime units in the movie Minority Report would…

Smartphones & Biometrics: The Big Picture

The big news last week on the smart phone security front was the announcement of Apple’s iPhone 5s with built in fingerprint scanning technology called Touch ID. Early reports say the biometric component will have somewhat limited use – mostly to replace the PIN used to unlock the device, or to confirm a purchase on…

Now Registering for Classes at Cybercrime U #INTH3WILD

 As summer comes to a close, students all over the world are heading back to the classroom – even in the cyber underground.  Over the last few weeks, RSA has observed a spike in the availability of cybercrime courses, lessons, counseling and tutoring that are being offered to help fraudsters achieve their career goals.  In…

Survey Says? Aveksa Solves IAM Complexity

Yesterday Family Feud returned with all new episodes.  You would think the long-running, syndicated game show that has seemingly cycled through as many hosts as Saturday Night Live would be sputtering to the end, especially following the questionable announcement that the Honey Boo Boo clan is headlining this season of “celebrity” family guest stars, but,…

Does Your Security Team Have What It Takes?

The agenda is jam-packed for most information security teams today. The demands of the business environment and threat landscape are forcing big changes. Especially in the last 18 months, teams have been adding everything from business risk management and process optimization to data analytics and continuous controls assurance to their plates. They need to figure…