Stephanie Goetz

Recent Posts

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

by Stephanie Goetz | Jul 21, 2023

They’ve come back around…those business email compromises, which were all too common in the late 2010s. Unfortunately, we have seen many of these in recent weeks, even with multi-factor...

Three Options to Implement Phish Resistant Multi-Factor Authentication

by Stephanie Goetz | Mar 17, 2023

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented as a One-Time Password (OTP) delivered via an...

Should Financial Institutions have a BISO Program?

by Stephanie Goetz | Feb 17, 2023

A BISO (Business Information Security Officer) is an ombudsman for business lines across an institution. This person is responsible for representing the business requirements, controls, and...

Tools to Check Out in the Cybersecurity Resource Guide

by Stephanie Goetz | Oct 14, 2022

Last week, we saw the Federal Financial Institutions Council (FFIEC) announce an update to its Cybersecurity Resource Guide. It was originally released in 2018 and intended to be a resource to...

Charging Dr. Ransomware

by Stephanie Goetz | Aug 12, 2022

Moises Luis Zagala Gonzalez, a 55-year-old Venezuelan cardiologist, has been charged with developing the Jigsaw v.2 and Thanos ransomware strains, which would make him one of the most productive...

Change, Conflict and Culture

by Stephanie Goetz | Jul 15, 2022

We have many institutions either going through or coming out of a large amount of change. It seems like there’s always some new guidance, product, or environmental change we find ourselves up...

What Does it Mean to be a Good Partner?

by Stephanie Goetz | Apr 29, 2022

While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this can apply to any third-party relationship such as...

What You Can do About the Okta Compromise

by Stephanie Goetz | Mar 25, 2022

News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100% honest here, it was an unfortunate eventuality...

Russian Cyberthreats

by Stephanie Goetz | Feb 25, 2022

This week the threat from Russia to the Ukraine has turned to reality. The attack was preceded by cyber threats probably long before the physical threat was known. It most likely began with the same...

Keep an Eye on API Security

by Stephanie Goetz | Nov 5, 2021

Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or outside an organization. Examples of APIs you may...

Want these articles delivered weekly to your inbox? Subscribe to our Newsletter!

Recent Posts

Stay in the Loop!