Information Risk Management

Displaying 1-4 of 4 results

  • White Papers // May 2011

    Bootstrapping Mobile PINs Using Passwords

    The authors describe a method of deriving PINs from passwords. The method is useful to obtain friction-free user on-boarding to mobile platforms. It has significant business benefits to organizations that wish to introduce mobile apps to existing users - but which are reluctant to make the users authenticate with passwords....

    Provided By Information Risk Management

  • White Papers // Oct 2008

    Targeting VOIP

    As more and more companies move towards a full scale replacement of conventional PSTN phones with a VOIP infrastructure, there is an increased incentive for malicious individuals to break into the phone architecture. The main benefit of implementing VOIP over conventional phone systems is cost saving and efficiency. With the...

    Provided By Information Risk Management

  • White Papers // Sep 2008

    Risky Business - Hacking the Trading Floor

    Drawing on the author's experience of working on large Forex, over-the-counter and proprietary trading systems for Fortune 500 banks, this paper aims to highlight the current application security trends and issues within financial trading applications and the common business risks associated with these issues. This paper is aimed at security...

    Provided By Information Risk Management

  • Case Studies // Aug 2008

    Information Risk Management Case Study: Configuration Review - IDS/IPS

    Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial components of an organisation's security infrastructure. However to maximise the effectiveness of an IDS or IPS, a finely-tuned configuration is required. The oversensitive IDS threatens its effectiveness by flooding even the most sophisticated log correlation engines, resulting in actual...

    Provided By Information Risk Management

  • White Papers // Oct 2008

    Targeting VOIP

    As more and more companies move towards a full scale replacement of conventional PSTN phones with a VOIP infrastructure, there is an increased incentive for malicious individuals to break into the phone architecture. The main benefit of implementing VOIP over conventional phone systems is cost saving and efficiency. With the...

    Provided By Information Risk Management

  • White Papers // Sep 2008

    Risky Business - Hacking the Trading Floor

    Drawing on the author's experience of working on large Forex, over-the-counter and proprietary trading systems for Fortune 500 banks, this paper aims to highlight the current application security trends and issues within financial trading applications and the common business risks associated with these issues. This paper is aimed at security...

    Provided By Information Risk Management

  • Case Studies // Aug 2008

    Information Risk Management Case Study: Configuration Review - IDS/IPS

    Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial components of an organisation's security infrastructure. However to maximise the effectiveness of an IDS or IPS, a finely-tuned configuration is required. The oversensitive IDS threatens its effectiveness by flooding even the most sophisticated log correlation engines, resulting in actual...

    Provided By Information Risk Management

  • White Papers // May 2011

    Bootstrapping Mobile PINs Using Passwords

    The authors describe a method of deriving PINs from passwords. The method is useful to obtain friction-free user on-boarding to mobile platforms. It has significant business benefits to organizations that wish to introduce mobile apps to existing users - but which are reluctant to make the users authenticate with passwords....

    Provided By Information Risk Management