Fraud Insights Through Integration

Another great conference at the Moscone Center in San Francisco. On the heels of RSA Conference, it’s fair to ask: When was the last time you counted the number of anti-fraud tools you are using to protect your consumer-facing environment?  Now, when was the last time you thought about the connective tissue tying data sources…

Blues and Bridging the Gap of Grief

The sound of blues flooded our ears, as approximately 2,000 information security professionals settled into the Ernest N. Morial Convention Center in New Orleans, LA, for the third annual RSA user conference, RSA Charge, from Oct 25-27. With our stomachs stuffed with local popular fare inclusive of crawfish, oysters & biegnets as we traversed Bourbon Street to…

Your Step-Up Authentication Compass… NIST & SMS – Finding North – Part 2

Authored by Greg Dicovitsky, Principal Solutions Architect, RSA In its recent solicitation for comment regarding its latest recommendation, the National Institute of Standards and Technology (NIST) has informed the public of its intent to eventually discontinue its recommending the use of Out-of-Band (OOB) Short Message Service (SMS) technologies to support the authentication of e-Commerce applications. [1]…

The Most Important Visitor On Our Premises

A customer is the most important visitor on our premises, he is not dependent on us. We are dependent on him. He is not an interruption in our work. He is the purpose of it. He is not an outsider in our business. He is part of it. We are not doing him a favor…

Your Step-Up Authentication Compass… NIST & SMS – Finding North

An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around…

Transaction Signing, Meet Selfie

Money-stealing Trojans be gone. When is the last time you logged into your online banking portal, made a payment transaction, and received a notification on your phone to validate the details of the transaction and tap approve? Better yet, when is the last time you had to use a physical hardware device to sign a…

Violinists to Biometrics – RSA Charge Outtakes

Actionable intelligence, anomalous patterns, 3rd platform transformation, readied response, mobile proliferation – just some of the thematic vernacular that characterized the hundreds of presentations, break-out sessions, and labs that filled the halls of McCormick Place in Chicago during RSA Charge. The excitement from partners and customers was infectious. Kicked off by a hip-hop violinist with staggering on-stage…

Are Cybersecurity Enhancements Drowning in the New Rec Center?

The trusty Jansport you’ve used for years is dilapidated and it’s time to replace those three ring binders. Paper supplies to fresh bedding are filling up the trunk. Let’s not forget the full size mirror for the back of the door. Mom & Dad are throwing in a jammer RFID card for your wallet, insisting…