Secure Collaboration in the Cloud

Guest blog authored by Mushegh Hakhinian, Chief Security Architect, Intralinks Organizations continue to struggle with moving data and other IT assets to the cloud for a number of reasons. Yet, one of the biggest fears is the lack of control over the security of the data and assets.  For cloud providers, it is imperative to…

Identity Protection and Beyond: What You Don’t Hear in the Media

Welcome Cyber Security Awareness Month!  It’s the time of year where we celebrate and teach all about safety on the Internet.  But unlike every other security expert out there who will be writing about tips on how to protect your digital identity from cyber thieves, I want to share the many ways in which organizations…

World Cup 2014:  Consumers Beware

When I think of the World Cup, there is always one colleague that comes to mind who I am convinced plans his vacation time around this global event.  In fact, this year he is flying to Chicago to watch the opener with an old friend.  Personally, soccer (or football as it is known to the…

Social Engineering and Online Dating

I have blogged on the topic of online dating in the past, and how it’s not much different than phishing and other forms of online fraud.  While it was meant to mock my personal experiences of dating in the 21st century, identity theft is no laughing matter.  In the last year, I had my debit…

Merchants Beware: Cyber Monday is Here

I’m sure you’re like one of millions of other global consumers rushing to get the hot online deals today.  I don’t know if I’ve been having more fun shopping for myself today, or my kids.  But I do know that I am willingly helping to push the e-commerce industry into the black, and was especially…

Digital Identities: I Have One For Sale

The term digital identity is so suiting to who we really are online.  Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with others…most of our lives are digital.  In a research study by Harris Polls (commissioned by RSA) on digital identities,…

Workplace Security: Are You the Weakest Link?

As an employee at some company somewhere, you are probably putting your organization at risk every day – and you don’t even know it.  Do you re-use the same password to log in to multiple accounts?  Are you visiting social networking sites and planning your upcoming summer vacation while at work?  Have you ever logged…

Social Media Fraud and the Olympics

With the 2012 London games more than halfway complete, the world’s nations continue to battle for Olympic glory.  As we follow our favorite athletes and pay attention to the daily medal count, most people don’t know about the other epic competition happening in the cyber underground. Fraudsters look at events like The Games as an…

Online Dating, Online Fraud: It’s All Relative

To me, online dating these days is not much different than online fraud.  I speak from personal experience on both – as someone who has experienced the thrills of online dating sites (NOTE sarcasm here) and has the privilege of witnessing the latest online scams that fraudsters pull on a daily basis.  I live in…