Brian Petzold
2 min read
Asset Management Lessons Learned from Morgan Stanley
Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...
2 min read
Typ0squatting
We recently have seen an increase in “typosquatting” activity targeting financial institutions. Typosquatting is when someone registers a domain with...
3 min read
Understanding Your Information Security Layers
Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...
2 min read
Changing How Vulnerabilities are Audited
Regulators expect that a financial institution will have a vulnerability scan performed by an independent third party at least annually. This scan...
2 min read
Murphy’s Law and Business Continuity Plans
Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...
2 min read
Controlling Sensitive Files Outside Your Institution
When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...