Stephanie Goetz

2 min read

Keep an Eye on API Security

Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or outside an organization. Examples of APIs you may be familiar with are travel sites with pull-in...

Read More

3 min read

Multi-factor Authentication Threats Heat Up

Just a few months ago, we wrote an article about the dangers of using SMS (text) to support multi-factor authentication (MFA), called Breaking the...

Read More

2 min read

The Regular Risk Assessment Revolution

The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation...

Read More

3 min read

Guidance from the FBI- Their Efforts and Your Role

After spending some time this week helping our customers with ransomware preparation, I found a statement on the FBI’s website that would be a great...

Read More

2 min read

FFIEC AIO Manual

FFIEC released a new handbook replacing the previous Operations Booklet with the new Architecture, Infrastructure, and Operations (AIO) Booklet on...

Read More

3 min read

5 Reasons Information Security is a Team Sport

In our line of work, we see many institution’s environments, cultures, and positions on the journey of their information security programs. One of...

Read More

2 min read

Hybrid Work Force Security

There’s yet another debate growing post-COVID. It’s not vaccinations, masks, or whether it’s safe to eat at a restaurant, it’s when and how much...

Read More

2 min read

Considerations for Securing Online Meeting Software

It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

Read More

2 min read

Qakbot Malware

Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

Read More