Join the Community

23,448
Expert opinions
42,335
Total members
302
New members (last 30 days)
176
New opinions (last 30 days)
29,126
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

The Tricia Bennett Mystery

A couple of weeks ago I got a LinkedIn invitation from someone called Tricia Bennett. I don’t know Tricia, and in such cases I’ve developed a best practice of first asking “hey mate, do I know you from somewhere”? What’s the rationale for linking yourself professionally only to people you’ve actually met? Well, other than general common sense, it’s...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Experian figures show just why we need EC3

Experian figures show just why we need EC3 and an industry strategy for countering Cyber Crime Following recent news from Experian that more than 12 million pieces of personal information have been illegally traded over the internet in the first four months of 2012 got me thinking about whether there is a disconnect between people’s attitudes to s...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Combating global cyber crooks

This week two large-scale fraud scams caught my attention. The first scam sees fraudsters using new and improved Zeus and SpyEye malwares to infiltrate people’s computers, enabling them to steal their personal details so that they can siphon large amounts of money into their own bank accounts. This isn’t the first time that malware has conquered i...

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

What's the worst that can happen?

Here are some further thoughts on the LinkedIn compromise, following my previous blog post. Over the years I did some unscientific research on LinkedIn. Here’s some unofficial statistics I have on LinkedIn accounts: about 25% of LinkedIn users use their real corporate email account as the user name. That’s not a good practice for many reasons, som...

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

Is your LinkedIn Password Compromised?

The recent LinkedIn accounts compromise in which 6.5 million password hashes were published in the Russian hacker community grabbed a lot of media attention. In a hellish period of publicly known breaches that hit the front page news, with perimeter security defenses failing left and right in any possible vertical and geography, this incident stirs...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Forgotten password? You're not alone

Many of us will have come back from the extended holiday period ready to start the New Year with a bang, only to realise that we’ve forgotten our computer password and can’t do anything until the IT department resets it. It’s not just the fact that you’ve been out of the office for 10 days. By insisting on “strong” passwords, IT departments are in...

/security

Retired Member

Retired Member 

How Safe is Your Mobile Wallet?

Consumers love alternatives, especially if the alternative is easy to use and already part of their everyday life. However, most consumers who undertake e-commerce using their mobile device are woefully unaware of the risks. Even when they do, there tends to be an ‘it-will-not-happen-to-me’ response. We are in some ways in the technological dawn ...

/security /payments

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Hello this is your fake bank calling...

With the UK’s “Get Safe Online Week” drawing to a close today, hopefully awareness of fraudulent online activity is on the up. The campaign highlighted all sorts of risks consumers may face with online banking, online shopping and their use of smartphones to browse internet websites, and explained how they could take care and be aware. Unfortunate...

/security

Retired Member

Retired Member 

eSecurity Infrastructures: Reflections and Lessons

In view of many eSecurity projects launched by banks & governments to secure their online services and organizations to secure remote access-control/ information assets, lets pause a little to reflect on key lessons in the last 10 years. Much of the lessons I will summarize below come from experiences within the Nordics, but hopefully are gene...

/security /retail

Retired Member

Retired Member 

New Requirements for Point to Point Encryption

Well they have arrived. After more than a year of discussion and debate the new requirements for Point to Point Encryption (P2PE) have finally been released by the PCI SSC. These requirements, which are contained in the Point to Point Encryption: Encryption, Decryption and Key Management within Secure Cryptographic Devices (Hardware/Hardware) v1....

/security /payments

Now Hiring