CEO Fraud: The New $2 Billion Phishing Scam

Like most employees, you don’t think twice before opening an email from your CEO. Given the latest email scam making the rounds in the workplace, maybe you should.  Statistics show that the spear phishing scam known as “CEO Fraud” has already racked up more than $2 billion in losses and victimized 12,000 individuals globally. Losses…

Measure your Readiness – Threat Intelligence Program

In the first part of this series we talked about the journey to undertake building a security monitoring and incident response program based on five dimensions: analytics, governance, measurement, operational and organizational. The third main program, also considered a primary capability of an effective Security Operations Center, is the development of tactical, operational and strategic…

Next-Generation Authentication: Addressing Changing Compute Paradigms

To achieve optimal security in today’s rapidly evolving computing environment, companies are turning to sophisticated authentication mechanisms. Next-generation authentication is identity and access validation that adapts to protect assets against both static and continuously changing variables. This type of authentication needs to accommodate the following: The burgeoning of bring-your-own-device (BYOD) trends The growing reliance on…

The Industrialization of Cybercrime: Driving Innovations in Security

If you compare the world of cybercrime now to that of 10 years ago, there really is no comparison. Whether one measures its impact through estimated profits – which some estimate as now surpassing those of the profits for illegal drugs – or from the scale, scope, and sophistication of available “black hat” services and…

Setting the Benchmark in the Network Security Forensics Industry

“Setting the benchmark” – “Beating thirty other products in threat detection and response capabilities” – “Outstanding achievement in product leadership, technological innovation, customer service, and product development” – “Superior capabilities for best addressing customer needs” Wow! While we certainly don’t do what we do here for such accolades – we do it to help our…

Risk Appetite Limbo

The Financial Stability Board (FSB), an international body that monitors and makes recommendations about the global financial system, published “Principles for An Effective Risk Appetite Framework” in November 2013.  Regulations were finalized around these principles by some regulators including the Comptroller of the Currency in 2014.  Although the genesis is FI-related, there are a lot…

Pervasive network visibility: driving the Federal security mission

Reports over the last year about catastrophic cyber breaches to Federal IT systems have been so frequent that we have been somewhat numbed to them. We have come to an almost dazed acceptance that our adversaries will continue to access and obtain highly sensitive information – on Federal employees, their families, the public, our marketplace,…

Reduce Fraud and Abandonment with a Risk-Based Approach to Online Sales

Sooner or later every business with an online presence is plagued by shopping cart abandonment. Sometimes a consumer changes their mind, factors in the cost of shipping and decides it’s not worth it, or is simply distracted long enough so the transaction is never completed. Getting a consumer to follow through is not as easy,…

Exceptional Access: An ‘Exceptionally’ Bad Idea

We the people — citizens, residents, visitors — have fundamental needs and inalienable rights. To give these concepts any meaning, we need to be secure from our adversaries and free to communicate. As such, we’ve given the government a mission: the money, mandate, and framework to help keep us safe. This vital work is performed…

Risk Intelligence Reveals Opportunity for Competitive Advantage

Risk intelligence measures an organization’s understanding and implementation of risk management strategies, which are essential to gaining a competitive advantage in any industry. However, after indexing nearly 400 organizations, RSA concluded that less than 10 percent of companies have a risk management strategy that is mature enough to be considered “advantaged.” This signifies that 90…