720-891-1663

Enterprises Are Still Failing At The Security Basics

VentureBeat wrote an interesting item pointing out some of the obvious things that Target messed up.  Fixing these items won’t stop every attack, but it certainly would slow the attackers down. According to a lawsuit filed in federal court recently Target missed the ball on a few things.  Of course, at this point, these are […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Problem Of Attribution Of Cyber Attacks

In some sense, cyber attacks are no different that physical world attacks;  in other ways, they are completely different. Let’s assume that you did not physically catch some bad guys that broke into a building.  Do you know who broke in?  On rare occasions they leave something behind – there have been instances so rare […]

Continue reading → [DISPLAY_ACURAX_ICONS]

First Party vs. Third Party Cyber Liability Insurance

For those of us who are not insurance experts, the distinction may not be obvious.  As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Background on the group that took down Sony and Microsoft on Christmas

Unlike the Sony breach in November, the group that took down Sony’s and Microsoft’s game network on Christmas (see article) seems to be very interested in getting attention.  Hopefully enough so that the FBI finds them, but that is another story. What is more important is that the people who did this, according to Brian […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why fingerprints should not be used for access control

A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like  Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs.  Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]

Continue reading → [DISPLAY_ACURAX_ICONS]