IDaaS, the New Identity White Whale or the Fish That Shouldn’t Get Away?

In Herman Melville’s epic novel Moby Dick, a crazed mariner wildly pursues an unattainable beast with tragic consequences. So too can the pursuit of identity solutions that give visibility to and control over cloud, mobile, web, and legacy applications feel like a wild quest. To this end, many organizations following the general IT trend of…

Hiding in Plain Sight: The Growth of Cybercrime in Social Media

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. Today, we are announcing the release…

Moving from Low to High-Fidelity Security

In the 1940s and 50s home audio systems went through a high-fidelity revolution. This is the period when the music recording industry and stereo manufacturers dramatically improved the audio experience for consumers.  Technically it had to do with the improved audio capture, more sophisticated mastering (stereophonics), and dramatically improved reproduction of music, all at a…

E5 – The Flies and the Hornet – Technical Dialogue

Episode #5 of Defend the Kingdom, “The Flies and the Hornet”, begins with Marty briefing Dave Reinhardt the CISO on a significant compromise of MagnaCorp’s security.  Improper logins, remnants of cracking utilities and other evidence clearly indicates a serious problem.  The source of the intrusion, while still unknown at this time, points towards a nefarious…

Threat Detection Techniques – ATM Malware

There once was a time when stealing money from a bank ATM required actual physical manipulation of the terminal itself.  Many criminal schemes have been repeated throughout the years, ranging from physical destruction of the terminal (ramming it with a vehicle) to the use of ‘skimmers’ to steal customer credentials.  Successful ATM capers were not…

Measure your Readiness – Incident Response Program

In today’s threat landscape it is a challenge to prevent the entire spectrum of attack vectors from impacting an organization. This is especially true with the increased adoption of new disruptive technologies and services such as cloud computing, mobility, BYOD and an increase in collaboration with third-parties who have access to the corporate’s network. On…

Operationalizing Monitoring and Response

There are constant attacks against every network, and security practitioners need to be prepared to defend their organization’s assets. However, while many organizations have technology to detect at least some of these threats, they do not have the resources to effectively follow up or act on what they may find. Over the past few years,…

Is the Internet of Things the (Second) Coming of Big Brother?

For years, my PC ran on XP, Microsoft’s most robust, steady and never-say-die operating system. It was a lot like my old Dodge Aspen that ran and ran and ran and was still going when the odometer reached 200,000 miles— the Energizer of its day. However, just as I ultimately had to replace my beloved…

E5 – The Flies and the Hornet – The Hornet’s Sting

The Ghost waited patiently on a hill overlooking the castle and contemplated his last few days.  His journey from the Frontier had been eventful.  Hiding from shadow to shadow, he had traversed the miles with deliberation and an overabundance of caution from his first entry into the Kingdom.  Abandoned hunting shacks, ancient caves, run down…

The Financial Fraud Effect of Real-Time Payments

Several weeks ago, I published an article which provided a summary of the Australian Payments Council’s Australian Payments Plan.  This plan is designed as a strategic roadmap for the future of Australian payments, specifically the initiative around the New Payments Platform, or NPP.  In short, the NPP is going to introduce the ability to send funds in real-time via online banking as a…