Blog Industry: Financial Services

Testing the Limits: Inside Owl Cyber Defense’s SEER Lab
As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ev...

Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor
Operation Skipjack – Part 1
Chapter One
INDOPACOM J3 Admiral Nikki Fury
Camp H. M. Smith Aiea, Hawaii
As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not r...

Daniel Crum Director, Product Marketing
Hidden Threats in AI Data: Protecting Against Embedded Steganography
As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...

John McKeon Business Development Manager - Financial Services
How Can SIEM Work with Air-Gapped Networks?
To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...

John McKeon Business Development Manager - Financial Services
Comments on the Upcoming NIST Special Publication 1800-25A
As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...

Gary McGibbon Business Development Manager - Financial Services
Integrating Digital Transformation and Cybersecurity Transformation in Financial Services
Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...

Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions
If the Capital One sysadmin had just changed the WAF password...
In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...

Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 2 – Findings
"That is a pretty egregious oversight."
In the second part of our three part series on the Capital One breach, I want to discuss the vulnerabilities and other elements that went into the...

Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 1 – What Happened?
Was Capital One an aberration?
Recently released data from the 2019 IBM/Ponemon Cost of a Data Breach Report identifies financial services institutions as one of the top two industry gro...

Charlie Schick Healthcare Consultant
Running Away is Not a Good Cyber Strategy for Ransomware
There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...

Phil Won Product Manager
Addressing the Cybersecurity Skills Shortage
Even more difficult than getting approval for an added headcount to address your cybersecurity concerns is finding the right person to fill that hard-fought opening. There are two factors...

John McKeon Business Development Manager - Financial Services
Secure Processing Enclaves for Crypto Asset Exchanges and Custodians
Cryptocurrency exchanges and custodians are an emerging and rapidly expanding market (>25%), with growth far exceeding that of the traditional capital markets sector. A relatively new ...