Security

Archive

2FA as a Way to Protect Against Social Engineering?

So this isn’t a new story, and it isn’t even unique, but it is a fairly high profile issue today given the importance of your domain. The summary of the story is that GoDaddy support...

Goodbye to another RSA Conference, but did he really just say that?

So I was going to post something about the closing keynote today, but when I realized it was a panel that included Alec Baldwin, I couldn’t bring myself to do it, especially when I saw...

Interesting Product at the RSA Conference Innovation Sandbox

So on the first day of the RSA Conference they hold the Innovation Sandbox; a contest for select new companies to present their ideas in 3 minutes as the best new innovation in security. Congratulations...

Why we believe in security industry Alliances, Initiatives and Standards

The technical and product teams at Green Rocket Security have spent many years working together in a variety of settings – and have seen firsthand how security industry alliances, initiatives and standards have worked to...

Can’t trust those strength meters to give you a strong password

So a study by Concordia has shown that the password strength meters we sometimes rely on to measure how good our passwords are, aren’t really that good themselves. The same password gave varied results about...

Why do we need a universal authenticator?

So I ran across this article and it was just "wow" about how some people manage their passwords. Now I've seen the stickies under the keyboard (or worse, on the monitor), and I even remember...

Are We Getting Closer to Universal Authenticators?

So I’ve talked a lot about how you can use 2FA within your organization, and how it could have solved some big issues in terms of hacks and other breaches in the last few months,...

Don’t Let the GHOST Catch You

Yesterday, Qualys announced a new vulnerability called GHOST. (Since Shellshock, everyone thinks vulnerabilities need to be named.) This vulnerability is in a critical library, glibc, and is a library used by the Linux kernel and...

So easy you don’t need a manual

I ran across this great article about the disappearance of instruction manuals and thought about how today (as noted in the article, but it’s pretty common) that the manual for my last computer was a...

83 Million Customers Impacted for Lack of 2FA

Interesting news today on the JPMorgan Chase hack from earlier this year. Apparently, while Chase had implemented 2FA in general, they didn’t complete the coverage on all servers and services. The attackers were simply able...