FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Yesterday the Board of Governors of the Federal Reserve System Federal Reserve the Federal Deposit Insurance Corporation FDIC and the Office of the Comptroller of the Currency OCC and together with the Federal Reserve and the FDIC the Agencies finalized previously proposed interagency guidance on how banking organizations should manage...

This article was written by Ryan Krawczyk Security Consultant I at FoxPointe Solutions What is Encryption Encryption is often utilized to protect and hide user information from hackers However understanding what encryption is and how it works may be daunting By looking at the first forms of encryption we can...

This article was written by Ryan Krawczyk Security Consultant I at FoxPointe Solutions Man in the Middle Attack Phishing and malware attacks have become well known methods of cyber security attacks But there is another less common but equally dangerous method of attacking Man in the Middle or Eavesdropping attacks...

This article was written by Christopher Salone CISA CCSFP MBA As another year passes more cybersecurity laws and regulations for financial institutions are proposed and or updated Let s recap the last twelve months and look at some of the most impactful cyber regulatory updates that whether coming soon or...

This article was written by nbsp Jessica Ramirez Security Consultant at FoxPointe Solutions In 2018 one of the most well known side channel attacks was discovered The Spectre and Meltdown attack was noteworthy because of how the exploitation affected almost every modern computer processor using software alone making it difficult...

This article was written by Christopher Salone CISA CCSFP MBA After years of presenting to Audit Committees you develop effective ways of communicating not only the results of your IT Audits but also the health and state of the Organization as a whole nbsp Frequently I find that at the...

This article was written by Brandon Agostinelli The Cybersecurity and Infrastructure Security Agency CISA defines Multi factor authentication MFA as a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user s identity for...

This article was written by James Normand Security Consultant at FoxPointe Solutions With the rise of ChatGPT deepfakes and AI generated art many people are being exposed to the black box that is advanced computer science nbsp While the inner workings of AI algorithms are known to their developers the...

SOC2 Fireside Chat with Charlie Wood of FoxPointe Solutions a division of The Bonadio Group Reg Harnish of OrbitalFire and Matt Farry of RealCISCO https www youtube com watch v=ZxsdPX kelQ

...

The FTC Safeguards Rule requires covered companies to develop implement and maintain an information security program with over 20 implemented documented and risk assessed administrative technical and physical safeguards designed to protect customer information Are your clients up on what the revised Rule requires Are they ready to be compliant...