August 8, 2016 - John Gunn
5 Ways That DEF CON Totally Owned Black Hat

The world’s most influential IT security gatherings just concluded and it was bigger and badder than ever. It is magnificently convenient that the two most important conferences, Black Hat and DEF CON, happen the same week in the same city. For two confabs serving the same industry, you won’t find two more distinctly dissimilar events anywhere else. While the overlap in audience is huge (it seemed like every attendee at… Read more


August 2, 2016 - Andrew Showstead
SMS is insecure, and is no longer suitable as a strong authentication mechanism.

The news is in that the National Institute of Standards and Technology has finally stated what both security professionals and hackers alike have known for years: SMS is insecure, and is no longer suitable as a strong authentication mechanism.  SMS Messages are not protected from the wrong eyes seeing them, and there is no assurance that they will actually go to the intended recipient.  So everyone knew this day was… Read more


The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is nothing on the horizon that can reverse these trends. Unlike… Read more


The impact of data breaches within the Healthcare Industry

The integration of technology within the healthcare sector continues to create seismic changes in how individuals receive medical care. Yet in their rush to adopt technology designed to improve the consumer’s experience, organizations within the healthcare industry face the very real threat of sensitive patient data ending up in the hands of cybercriminals. When it comes to the value of stolen data within the criminal underground, the more personal the… Read more


Face Recognition for Mobile Apps – As Easy As Taking a Selfie

Next time you take a selfie, it could be used for your own protection. Face Recognition is a simple, secure and user-friendly security feature that utilizes multiple facial data points to accurately authenticate end users and next generation likeness detection to defeat hacker spoofing techniques. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by their intrinsic physical or behavioral traits. Much like fingerprints, face… Read more


A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers.   I heard, “we use usernames and… Read more


On the road to trusted identities in healthcare, or just more compliance work?

On Feb 9th, the Senate health committee unanimously (22-0) approved wide-ranging legislation designed to improve health IT by modifying requirements relating to the development and use of electronic health records (EHR). Senate Bill S. 2511, “To improve Federal requirements relating to the development and use of electronic health records technology” is clearly a result of Congress’ displeasure with the lack of interoperability, data sharing and security in our healthcare system… Read more


Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one bit with the New Year. Below is a brief look… Read more


A famous Warren Buffet quote starts with this statement, “It takes 20 years to build a reputation and five minutes to ruin it…” For financial institutions, few things are as potentially damaging as customers suffering losses because of social engineering schemes. These types of attacks undermine consumer confidence in a bank’s brand, put customers at great risk of financial loss, and collectively cost the financial industry countless millions of dollars… Read more


October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission and brakes. The significance of this threat is off the… Read more