Month: February 2018
Jim Jeffries on US airport security
The rest of the world tends to look askance at the way that we here in the US handle airport security. Many of the measures…
Outsourced security program failure leads to $100K regulatory fine
Another reminder of the importance of managing third party vendor relationships… The Commodity Futures Trading Commission fined AMP Global Clearing (an electronic trading firm) $100,000…
Leaky buckets and acquisition best practices
There are three interesting things for CSOs to think about in this story on a leak of passport and other personal information on tens of…
Malicious data leaks and corporate liability – a tale of two countries
Databreaches.net had a link to a very interesting article about corporate liability for an employee’s malicious leaking of employee information. What was most striking to…
Two factor authentication on web apps should be the default
tl;dr – If you are using Microsoft Office 365 (or any other hosted email solution) and have not enabled two factor authentication, you are bad…
Protecting your nuclear reactor from insider threats
OK, so you may not be protecting a nuclear reactor against insider threats, but this presentation from the International Atomic Energy Agency contains a LOT…
Insider Threat Resources – 01-Feb-2018
I have the privilege as serving as a mentor for a course at SUNY-Albany focusing on the problems posed by insider threats. Since I am…