Blogs by Alissa Knight

January 22, 2019

The increasingly complex regulatory environment, along with ongoing technological gains largely propelled by the new emerging industry of fintech, have transformed the very nature of financial fraud and given rise to a new breed of adversary more technologically advanced than in decades past. Over the past two decades, the chief risk officer (CRO) and chief information security officer (CISO) fought different foes on disparate fronts.

December 18, 2018

First, there were just usernames. Then came usernames and passwords. Then came multifactor authentication (MFA), which requires something you know, such as a username and password; something you have, such as a one-time password token; or something you are, such as biometrics using your fingerprint or a retina scan. Now frictionless identity access management (IAM) is the “soup du jour” as companies work to make MFA more effortless for the end user.

October 31, 2018

Bugs, also referred to as software vulnerabilities, are flaws that can be abused to cause a system or software to have unintended behaviors that disclose sensitive information, negatively impact availability, or provide unauthorized access. These bugs are what malicious hackers use to successfully achieve their after-action goals in a long kill chain of steps.

October 23, 2018

I've seen a lot of board rooms over the last 18 years and have met with boards of directors for companies with as few as 100 employees and companies with as many as 50,000 employees. In every one of these meetings, I've been asked the inevitable, arguably rhetorical question, "Are we secure yet?"

Pages