720-891-1663

The Gap Between The Board and IT Security

The Ponemon Institute released a study that compares the views of about 7,000 Board members and 11,000 IT security people and the results show some interesting data. The first question is ” Our board of directors understands the security risks to the organization”.  While 70% of the board members agree or strongly agree with that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

It’s Patch Day

Yesterday was Patch Tuesday.  Microsoft had 14 bulletins, 5 of which they deemed critical, covering 59 vulnerabilities. Oracle released patches covering 193 vulnerabilities, including 25 Java patches, one of which is already being exploited in the wild.    44 of these vulnerabilities came from third party components.  Of the 25 Java vulnerabilities fixed, 23 of […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Knowledge Based Authentication Is Useless

Knowledge Based Authentication – using information that only you know – used to be a very popular method for validating that you are you.  Examples of this are when a customer service agent asks you for your birth date, last four of your social or where you were born.  The credit bureaus even sell that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

UL Seal Of Approval On Your Internet Connected Device – Maybe

Underwriters labs, the folks that test most consumer electrical appliances for safety, has set up a division to certify Internet of Things devices – whatever they are.  Apparently, most people have heard of the term, but don’t know what that means.  An example of it might be your Internet connected refrigerator that texts you when […]

Continue reading → [DISPLAY_ACURAX_ICONS]