Category Archives: Identity Assurance

Reactive Cybersecurity Strategy Is Not A Strategy

April 16, 2014 by Jason Soroko     No Comments

It’s encouraging that many organizations have become aware of security of their networks and computer resources. This awareness is sometimes triggered by breach or fraud headlines in tech journalism, which leads to concern and curiosity. It is immediately apparent when I’m speaking with a company that has suffered from an attack because their questions are [Read More...]

Border Security Strengthened by Automated Airport System

March 26, 2014 by Entrust, Inc.     No Comments

For busy travel hub Midway International Airport in Chicago, the recent implementation of automated kiosks will speed up travel time. 

Filed Under: Citizen eID, Government Authentication Tagged With:

How Can Financial Institutions Drive Better Risk Assessment?

March 25, 2014 by Entrust, Inc.     No Comments

Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]

Filed Under: Fraud, General Tagged With:

The Identity Context

February 19, 2014 by Jason Soroko     No Comments
This entry is part 3 of 3 in the series Identity Context: Defense's Next Play

This entry is part 3 of 3 in the series Identity Context: Defense’s Next PlayPart Three: The Identity Context  All attacks involve some form of stolen identity. According to Mandiant’s threat landscape study, 100 percent of breaches they investigated involve stolen credentials. In our own studies — where we reverse-engineered malware and studied the source [Read More...]

Top 5 Security Practices for Financial Institutions to Defeat Online Identity Attacks

February 10, 2014 by Mark Reeves     No Comments

The Bank of England (BoE) recently simulated a major cyber-attack against the British financial system that yielded some disturbing results: many of the UK’s largest financial institutions are unprepared for large-scale online identity-based attacks. More surprisingly, many of them are also uneducated on how to detect and report cyber security breaches. The Telegraph UK reported [Read More...]

You Can’t Defend Against What You Can’t Detect: Malicious Signals in Legitimate Noise

February 4, 2014 by Jason Soroko     No Comments

 As a CIO, CISO, or anyone else who has to defend a corporate environment from malicious activity, there are many point solutions to spend your budget on. A lot of these technologies are really good and there certainly is no shortage of them.    Walk around a vendor floor of any large security conference and [Read More...]

Filed Under: Identity Assurance, Malware Tagged With:

Playing in the Digital Sandbox: Balancing System Trust

January 22, 2014 by Jason Soroko     No Comments

On a daily basis, most people using desktop operating systems consume resources and ‘rich content’ from unknown sources on the Internet, typically via technologies ‘under the hood’ of our Web browsers.  These include Java, browser plugins like Adobe Flash, PDF readers, HTML5 and others. All are meant to create a rich and seamless user experience. [Read More...]

Filed Under: Identity Assurance, Malware Tagged With:

Credit Card Number Theft: POS Malware and the Path of Least Resistance

January 15, 2014 by Jason Soroko     No Comments

It was December 2011 when we first read about payment card number theft that occurred at Subway sandwich shops. Now, we’re sorting through the theft of 40 million payment cards from Target. That number was revised to 70 million names and identifying information such as phone numbers.   Researchers, most notably Brian Krebs, have done a [Read More...]

Digital Certificates: Strengthening Security in the Enterprise

January 13, 2014 by Entrust, Inc.     No Comments

Upon first glance, a utility meter might seem like the furthest thing from a security threat than you could imagine. After all, what harm could come from a device that measures the amount of electricity or gas your building consumes? The reality is, however, that in today’s ultra-connected world, this type of naive thinking could [Read More...]

Top 10 Holiday Scams to Steer Clear of this Season – Part 2

December 16, 2013 by Entrust, Inc.     No Comments

This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you [Read More...]