Tag Archives: identity

Cybercriminals extorted about one billion dollars from ransomware victims last year, according to the FBI. And nearly all of those perpetrators went unprosecuted because of the innovative methods they use to protect their identities and hide their funds. They go to great lengths to keep authorities from seizing or freezing their money. By and large, their efforts have paid off. Here’s how they do it: Hidden identities, disposable email Extortionists protect their identities whenever interacting with victims. This generally occurs when they distribute ransomware, and when they collect ransom payments…

Continue reading

The concept of identity is core to the protection of data.  Data and other computing resources exist to be used by individuals, each of whom has an identity that is used to grant or deny access to such resources.  However, identity is not limited to humans.  Computer services also have an identity that allows them to interact with other services and data. As humans, we understand identity as all the characteristics that are representative and unique of an individual and our method of validating identity comes naturally in the course…

Continue reading

In childhood I dreamed of a world quite grand Where my name and face were far from mystery A life far removed from one boring and bland Popular, famous, in fact, pure fantasy How could I know that my dream would become real My name and identity are known far and wide Governments, stores, and thieves don’t need to steal I’ve given it freely, when asked, I provide Now everything is different, complex, distorted Reportedly the data on me is vast All that I do is electronically recorded Much of…

Continue reading

As hard as it is to believe, 2014 is almost at a close. While some think about Holiday gatherings and gifts, I ponder what the next year will bring. What will security, technology, mobile and the cloud look like in 2015? Security is primed for change and we will see pressure both internally and externally. External pressure will come from compliance and consumers. It takes time for security practices, even those specified by governing bodies, to be widely accepted and practiced. However, we have reached the point where the expectation…

Continue reading

Data Loss Prevention (DLP) is a technology that keeps an inventory of data on organizational devices, it tracks when that data moves and applies rule sets to prevent data from moving to unauthorized locations such as a thumb drive, cloud server, or an email recipient outside the company. DLP can significantly help organizations understand and control the data that is used, stored, and transmitted and it is seeing increasing use in by internal compliance groups as they try to meet strict regulatory requirements. Another technology, Security Information and Event Management…

Continue reading