Recent Posts

Vulnerability management – we’re doing it wrong

Security professionals (and the people who measure our performance like auditors and regulators) have traditionally taken a stance that “all serious vulnerabilities should be patched”…

Continue Reading

IRA Financial versus Gemini – security questions to ponder from a crypto IRA hack

The cryptocurrency world has been the scene of some *wild* stuff lately… and a recent lawsuit filed by IRA Financial Trust against Winkelvossian crypto exchange…

Continue Reading

UBS takes a step towards a passwordless future

It looks like the end of the password may be coming a bit more quickly than I had expected… I received an email from UBS…

Continue Reading

Cloud computing concentration and systemic risk

I came across an interesting blog post over at Finextra which got me thinking about a topic that has been in the back of my…

Continue Reading

Make your near misses count

Security near misses are opportunities for learning and improvement, but when they are ignored, they can play a role in setting the stage for serious incidents. Use them wisely!

Continue Reading

Hunting for secrets on GitHub

We need to work with system designers and developers to make them understand that using a secure credential vault with programmatic access is not an optional luxury – it is a basic security requirement. Credentials do not belong in code, even if that code is stored in a safe inside a vault inside a volcano.

Continue Reading

Another killer woodpecker

Way back in 1977, a computer scientist from the University of Nebraska coined “Weinberg’s law:” If builders built buildings the way programmers wrote programs, then…

Continue Reading

LinkedIn and LOLBINs

Yet another example of how LinkedIn can be abused by the bad guys… a phishing campaign which used job titles scraped from user profiles to…

Continue Reading

It’s official… SMS is not a security tool

UPDATE: The three major US mobile carriers have closed this particular loophole… however, it is not clear if carriers in other parts of the world…

Continue Reading

Malware protection is easy – Malinformation protection is hard

Whenever it seems like the challenges of protecting my employer from risks to information security or business continuity are towering above me, I stop and…

Continue Reading