We are proud to provide content and observations in Blockchain and distributed ledger technology, data integrity, data assurance, electronic communications, cyber security and smart contracts.
April 16th, 2017
The advent of portable devices; i.e. laptops, smartphones, and tablets permits us the opportunity to work from wherever we choose. The reality is that we are tethered, more than ever, to our devices and our jobs. It is this connection to our jobs that creates great promise and opportunities while at the same time greater enterprise exposure and risk. More than ever, there are multitudes of entrances into an organization, its systems, and arguably one of its most valued assets: data.
March 3rd, 2017
In its simplest and intended form, a smart contract is a computerized transaction protocol that executes the terms of a contract. Nick Szabo is credited with coining the term smart contract in the mid-1990’s. Szabo, “the cryptographer known for his research on digital currency, wrote an article about smart contracts as early as 1995. Szabo’s article, “Smart Contracts,” was published in early 1996 in the magazine Extropy, and forecast with prescient accuracy the benefits and parameters of the blockchain contract applications in development and making blockchain news headlines today…
December 16th, 2016
Wire Transfer Fraud is the act of defrauding funds from a company or individual through a scheme most commonly conducted through email communications. Typically, the bad actor will profile their target before the initial intrusion is conducted. By profiling, the hacker will study the people and processes within the organization and who has access and the authority to transfer assets. Because the target has been unknowingly profiled or surveilled for a period of time, the attacker will communicate in a very personalized, seemingly harmless, professional and familiar tone.
October 21st, 2016
The New York State Department of Financial Services (“DFS”) has been closely monitoring the ever-growing threat posed to information and financial systems by nation-states, terrorist organizations and independent criminal actors. Recently, cyber-criminals have sought to exploit technological vulnerabilities to gain access to sensitive electronic data.
October 10th, 2016
Spear Phishing and Familiarity
So what is Spear Phishing exactly? It’s a newer form of sophisticated phishing which thrives on familiarity. This type of attack is in contrast to older methods where the target is invited to click a random link sent out in bulk emails. Unlike traditional phishing, which is mostly conducted through spam, spear phishing aims at a very specific target of companies and individuals. Although this technique has been around for quite a while now, it always seems to find a way to infiltrate and expose companies or individuals going undetected by traditional firewalls and other screening technologies.
September 19th, 2016
On September 15, 2016, the Federal Bureau of Investigation issued Alert Number I-091516-PSA. The PSA explicates the risk and shortcomings of relying upon encryption as a comprehensive platform for email security.
September 12th, 2016
In August 2016, Bruce de’Medici, Director of Legal & Cyber Security for Uledger, Inc. attended a briefing with The White House Cybersecurity Coordinator on Presidential Policy Directive 41.
The Directive sets forth principles governing the federal government’s response to cyber incidents. The pillars of the Directive are to enhance security, take the fight to the bad guys, and improve reaction and recovery. The Directive establishes lead federal agencies to respond to cyber incidents and an architecture for coordinating the response.