Brian Petzold

2 min read

Asset Management Lessons Learned from Morgan Stanley

Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or decommission systems. Every IT Manager has been through system migrations that resulted in piles of legacy...

Read More

2 min read

Typ0squatting

We recently have seen an increase in “typosquatting” activity targeting financial institutions. Typosquatting is when someone registers a domain with...

Read More

3 min read

Understanding Your Information Security Layers

Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...

Read More

2 min read

Changing How Vulnerabilities are Audited

Regulators expect that a financial institution will have a vulnerability scan performed by an independent third party at least annually. This scan...

Read More

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

Read More

2 min read

Controlling Sensitive Files Outside Your Institution

When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...

Read More