Blog Industry: Financial Services

Testing the Limits: Inside Owl Cyber Defense’s SEER Lab

As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ev...
March 26, 2025
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack – Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury  Camp H. M. Smith Aiea, Hawaii  As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not r...
March 24, 2025
Daniel Crum Director, Product Marketing

Hidden Threats in AI Data: Protecting Against Embedded Steganography

As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...
November 19, 2024
John McKeon Business Development Manager - Financial Services

How Can SIEM Work with Air-Gapped Networks?

To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...
October 7, 2020
NIST Comments
John McKeon Business Development Manager - Financial Services

Comments on the Upcoming NIST Special Publication 1800-25A

As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...
March 10, 2020
Gary McGibbon Business Development Manager - Financial Services

Integrating Digital Transformation and Cybersecurity Transformation in Financial Services

Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...
September 20, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions

If the Capital One sysadmin had just changed the WAF password... In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...
August 15, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 2 – Findings

"That is a pretty egregious oversight." In the second part of our three part series on the Capital One breach, I want to discuss the vulnerabilities and other elements that went into the...
August 13, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 1 – What Happened?

Was Capital One an aberration? Recently released data from the 2019 IBM/Ponemon Cost of a Data Breach Report identifies financial services institutions as one of the top two industry gro...
August 9, 2019
Charlie Schick Healthcare Consultant

Running Away is Not a Good Cyber Strategy for Ransomware

There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
July 11, 2019
Phil Won Product Manager

Addressing the Cybersecurity Skills Shortage

Even more difficult than getting approval for an added headcount to address your cybersecurity concerns is finding the right person to fill that hard-fought opening. There are two factors...
July 9, 2019
John McKeon Business Development Manager - Financial Services

Secure Processing Enclaves for Crypto Asset Exchanges and Custodians

Cryptocurrency exchanges and custodians are an emerging and rapidly expanding market (>25%), with growth far exceeding that of the traditional capital markets sector. A relatively new ...
June 27, 2019
Prev
1 2
Next