Data breaches – the new daily reality
By Ben Rothke, Senior Security Consultant, BT Global Services Two stories from July about data breaches should give everyone pause. The WikiLeaks’ Afghan War Diary shows the staggering effect of a...
View ArticleAmazon, Starbucks and Information Security Data – Part #1
By Ben Rothke, Senior Security Consultant, BT Global Services, CISSP CISA What do Amazon and Starbucks have to do with information security data? They seem to be the mechanism being used to obtain...
View ArticleLet’s Practice What We Preach – Stay Safe Online
By Tara Savage, Global Security Marketing Manager, BT As security professionals, we think about data privacy and network security issues more than the average person. But do we take our own advice to...
View ArticleWikiLeaks: What Caused the Largest Leak in History?
If publishing several thousand U.S. Department of State (the State Department) communication cables on the Internet is not the largest public leak in the history of the U.S. government, it is certainly...
View ArticleSecurity of the Cloud: Challenges and Landscape
The cloud landscape continues to evolve quickly, and, as a true ecosystem, has seen the introduction of several new technologies, delivery models and players into the market. It is characterized by...
View ArticlePass Me a Towel, the Frog Wants to Get Out…
By now we are all more than aware of the stream of attacks, exploits, disclosures and denial of service attacks, to name but a few. Some of these make it into the mainstream media, others have...
View ArticleThe 12 Days of Christmas for Security Geeks
Twas the night before Christmas, and all through the house, not a peripheral was stirring, not even a (bluetooth) mouse… So, it is that time of year again where everyone is filled with holiday spirit...
View ArticleCalifornia Expands Its Data Breach Notification Law
On January 1, 2012, California’s expanded version of its Identity Theft Law came into full effect. SB 24, which had been signed into law by Governor Jerry Brown in 2011 established specific content...
View ArticleThe PCI Council’s ASV Program Gets a Makeover
In order to be PCI compliant It is required that customers scan their networks quarterly and for their external presence to be scanned by an Authorized Scanning Vendor program (ASV). In 2011 the PCI...
View ArticleGuest Post: Three Malware Trends to Watch in 2012
2011 was a landmark year to say the least, in terms of network security and the overall evolution of malware, and there are no indications that things will slow down anytime soon. In fact, we expect to...
View ArticleHow We Manage/Don’t Manage Security is of Great Importance
By Sam Erdheim, Algosec The title of this blog entry may seem obvious, but it hasn’t traditionally elicited the headlines that the latest data breach or attack vector regularly receive. Poor visibility...
View ArticlePassword perils
By Peter Gunning, Business Development, Identity Services, BT In an industry which loves its eponymous laws (e.g. Moore’s, Wirth’s) and principles (e.g. Kerckhoffs’s and…er…Dilbert’s) someone surely...
View ArticleA new identity in financial markets
Banks, brokers and market regulators around the world have always faced the challenge of identifying individual counterparties and customers. Within financial institutions, because of the siloed...
View ArticleBiohazard: Will biometric authentication ever go mainstream? – Part 1
In the first of a two part blog Peter Gunning – Identity Management Consultant, BT – discusses the use of biometric authentication and if it’s likely to catch on and replace the use of passwords and...
View ArticleBiohazard: Will biometric authentication ever go mainstream? – Part 2
In the second part of his blog looking at biometrics, Peter Gunning – Identity Management Consultant, BT – discusses the use of biometric authentication the benefits it could have in the real world....
View ArticleData breaches – the new daily reality
By Ben Rothke, Senior Security Consultant, BT Global Services Two stories from July about data breaches should give everyone pause. The WikiLeaks’ Afghan War Diary shows the staggering effect of a...
View ArticleAmazon, Starbucks and Information Security Data – Part #1
By Ben Rothke, Senior Security Consultant, BT Global Services, CISSP CISA What do Amazon and Starbucks have to do with information security data? They seem to be the mechanism being used to obtain...
View ArticleLet’s Practice What We Preach – Stay Safe Online
By Tara Savage, Global Security Marketing Manager, BT As security professionals, we think about data privacy and network security issues more than the average person. But do we take our own advice to...
View ArticleWikiLeaks: What Caused the Largest Leak in History?
If publishing several thousand U.S. Department of State (the State Department) communication cables on the Internet is not the largest public leak in the history of the U.S. government, it is certainly...
View ArticleSecurity of the Cloud: Challenges and Landscape
The cloud landscape continues to evolve quickly, and, as a true ecosystem, has seen the introduction of several new technologies, delivery models and players into the market. It is characterized by...
View Article
More Pages to Explore .....