Brian Petzold

2 min read

Herding CATs

Read More

3 min read

Understanding Your Information Security Layers

Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...

Read More

2 min read

Changing How Vulnerabilities are Audited

Regulators expect that a financial institution will have a vulnerability scan performed by an independent third party at least annually. This scan...

Read More

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

Read More

2 min read

Controlling Sensitive Files Outside Your Institution

When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...

Read More

2 min read

The Importance of Social Media Monitoring

Most institutions spend a lot of time and money guarding and monitoring their network perimeter and their internal networks against attackers....

Read More

2 min read

No Rest in 2020

It is the third week of 2020, and already the year 2020 has brought two new major vulnerabilities and two new major threats that banks and credit...

Read More