From the Summer 2021 Issue

New Executive Order Knocks Down Old Barriers

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

New Executive Order

Southwest Airlines (SWA), Flight 1380, was climbing through 32,000 feet on the morning of April 17, 2018. At approximately 11:03 am, fan blade No. 13 of the left engine shattered along a previously undetected stress fracture. A 12-inch section, weighing about 6.825 pounds and a two-inch section of a fan blade weighing .650 pounds, separated … Read more

Even Cyber Pros Fall Victim to Cybercrime and Bad Habits

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Cyber Pros Fall Victim to Cybercrime

Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into a trap where a backdoor was installed on unsuspecting researchers’ operating systems. This scheme was discovered by Google’s Threat Analysis … Read more

Proving a Negative

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

KBA and Data Breaches

Proving there is a “you” has never been easier; proving you are the only you, not so much. We learned in math class in high school that you cannot prove a negative. Or to be more precise, we learned that you cannot solve a negative proof. As a result, in math and logic, we spend … Read more

From the Winter 2021 Issue

Cybercriminals Don’t Need to Steal Mass Amounts of Personal Data Anymore and That’s a Big Challenge for Cybersecurity Teams

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

stealing Data

For at least the past 15 years, a primary goal of cybersecurity teams was to block threat actors from gaining access to the growing amount of personal information collected about consumers. Meanwhile, threat actors focused on a never-ending quest to hoover-up as much consumer personal information as possible to convert to cash. Over time, technology … Read more

From the Fall 2017 Issue

Your Web Applications are Under Attack: Are You Ready?

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

John M. Holt, Founder & CTO, Waratek

On a day in June, the year 2017 became another year r the record books – six months early. According the non-profit Identity Theft Resource Center C), publically reported data breaches exceed ’s record pace by as much as 80 percent in sectors s Financial Services. As of September 1st, only vernment/Military category was behind … Read more