For those wanting to gain more insight into probability studies or forward researching at what the hacking the community is going after, this is a great article to read. Category: Uncategorized
-
Follow the Data – Debunking the Security Myths
For those wanting to gain more insight into probability studies or forward researching at what the hacking the community is going after, this is a great article to read. -
RiskKey at Finovate Spring 2010

Awesome! A single word to describe our FinovateSpring 2010 demo experience. We presented RiskKey to a room filled of leading Financial Institutions, top executives and media chanting “Compliance Sucks!” The reception was incredible and the reviews even more so as the twitterverse took our compliance message global.
@netbanker “Brad Garland leads cheer of “compliance sucks” #Finovate and is now showing how its RiskKey tool to help make it suck less; nice touch”
(more…) -
In Banks We Trust?
(more…)
Guardian Analytics in conjunction with Ponemon recently released their 2010 Business Banking Trust Study (details here). I am intrigued that the headline touts that “banks have a new troubled asset – their customers.” Forgive me if I am wrong, but customers did not just become a “troubled asset”: not this year…not last year, nor the year before that. Customer churn has always been an issue directly associated with security and thus trust. Perhaps we can revise the statement to say that banks are now aware, or I dare say admitting that security extends beyond passing the GLBA or FFIEC audit. That would be a good place to start. -
How CISOs Can Improve the Cybersecurity Landscape
In larger environments, it is not uncommon to have both a CIO/CTO and CISO (Chief Information Security Officer). The CTO/CIO is usually held accountable for the development and implementation of the IT strategy to support the institution’s business strategy in line with its risk appetite. A CISO is typically responsible for overseeing and reporting on the management and mitigation of information security risks across the institution and is held accountable for the results of this oversight and reporting.

(more…)
-
A Security Lesson from a Security Coach
I know in previous blogs I mentioned I grew up in a small town here in Texas. I even went to a small college in a slightly larger, but still small country town (it had a Wal-Mart). I continue to live like I live in a small country town. For example; I still like to wave at people when I drive by (even at night), I like to keep my back door unlocked just in case someone needs something, I like to leave my keys in my unlocked truck so I don’t loose them, I like to leave my truck running when I run into the grocery store for a quick trip and I really like to say howdy to all the folks I pass. Do you notice there is a theme with my truck and/or doors? Now, I’ve been told many a time that I’m asking for it, and I am just like my grandmother. When we would ask her why she was speeding so fast and not wearing her seatbelt she would reply; “If the good Lord want to take me…I’ma ready.” Not really sure if “I’ma” is a word but I had a similar response for my friends and family; “If they want it that bad they must need it more than me.”
(more…)



