• Entrust at RSA: Secure Mobile, Leverage Mobile

    Part 4 of 9 in the Series — Entrust at RSA Conference 2013
    During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.

        in Identity Assurance, Mobility
    0
  • Eurograbber Proves SMS Not Suited to Secure Bank Transactions

    Last week, news was released that Eurograbber compromised user PCs and mobile SMS to execute financial fraud at 30 different banks across Europe.

        in Fraud, Mobility
    0
  • The Token Debate: Why the RSA and ISACA Perspectives Are Wrong

    While I would never claim to be a maven in the world of cyber security, I find it quite disturbing that a long-standing security vendor such as RSA would proclaim, “Since its (one-time-password token) inception, the world’s most respected security researchers have worked, unsuccessfully, to ‘break’ this technology.” Well, I can’t comment on the world’s most respected security researchers, but

        in Fraud, Identity Assurance
    0
  • Command and Control

    I recently attended the Black Hat USA 2012 in Las Vegas. During the conference, I focused my attention on cyberespionage. This involves attackers who are on a mission with well-defined objectives. They are a source of persistent, targeted attacks. I learned a lot about command and control during my training. Command and control — also known as C&C or C2

        in Malware
    0
  • The Token Debate: Why the RSA and ISACA Perspectives Are Wrong

    While I would never claim to be a maven in the world of cyber security, I find it quite disturbing that a long-standing security vendor such as RSA would proclaim, “Since its (one-time-password token) inception, the world’s most respected security researchers have worked, unsuccessfully, to ‘break’ this technology.” Well, I can’t comment on the world’s most respected security researchers, but

        in Fraud, Identity Assurance
    0
  • Command and Control

    I recently attended the Black Hat USA 2012 in Las Vegas. During the conference, I focused my attention on cyberespionage. This involves attackers who are on a mission with well-defined objectives. They are a source of persistent, targeted attacks. I learned a lot about command and control during my training. Command and control — also known as C&C or C2

        in Malware
    0