2 min read
The Wild, Untamed, and Exciting World of Passkeys
In today's digital landscape, securing user authentication is more critical than ever. Recently, I explored the benefits of using Yubikeys and...
2 min read
In today's digital landscape, securing user authentication is more critical than ever. Recently, I explored the benefits of using Yubikeys and...
1 min read
As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....
2 min read
Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...
1 min read
As financial institutions increasingly embrace the benefits of cloud computing, the importance of cloud security cannot be understated. While the...
2 min read
Financial institutions rely on numerous third-party providers to support their operations and deliver essential services. However, these partnerships...
3 min read
Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...
2 min read
I recently had the opportunity to attend, and speak at, the Southeast Community Bank I.T. Rightsourcing Conference in Georgia. It was a great 1-day...
2 min read
I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity...
2 min read
While the FFIEC has released three major guidance updates since July 2019, the FDIC has not updated its examination program to include the newer...
1 min read
Reviewing Complementary User Entity Controls (CUECs) is an important part of any financial institution’s third-party management program. However, we...