2 min read
Brian Petzold

3 min read
Understanding Your Information Security Layers
Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...

2 min read
Changing How Vulnerabilities are Audited
Regulators expect that a financial institution will have a vulnerability scan performed by an independent third party at least annually. This scan...

2 min read
Murphy’s Law and Business Continuity Plans
Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

2 min read
Controlling Sensitive Files Outside Your Institution
When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...

2 min read
Update: What We're Seeing From the COVID-19 Pandemic Planning Front

2 min read
The Importance of Social Media Monitoring
Most institutions spend a lot of time and money guarding and monitoring their network perimeter and their internal networks against attackers....

2 min read
No Rest in 2020
It is the third week of 2020, and already the year 2020 has brought two new major vulnerabilities and two new major threats that banks and credit...