Blogger profile: Jennifer Dean
Jen manages the marketing for PKI-based authentication solutions. Based in the weird city of Austin, Texas, Jen likes blogging about all things security, but especially about challenges IT professionals face to keep systems protected without completely antagonizing users. Prior to Thales, Jen spent five years in eBanking and financial services. Likes: dogs, Bavarian hefeweizen, sitting on the beach with a good book. Dislikes: sweet potatoes. Aspires to: write a novel.
Posted on 22 May 2014 by Jennifer Dean
It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach. The cybercriminals were able to […]
Posted on 05 June 2014 by Jennifer Dean
The UK’s National Crime Agency (NCA) is warning everyone to protect themselves against Cryptolocker and ZeuS malware before they both make inevitable returns to the web in less than two weeks. The NCA is working with the FBI and Europol in an effort to suppress the GameOverZeuS Trojan and the Cryptolocker ‘ransomware’ that encrypts victims’ […]
Posted on 03 October 2014 by Jennifer Dean
What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?
Posted on 31 October 2014 by Jennifer Dean
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 07 November 2014 by Jennifer Dean
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 05 January 2015 by Jennifer Dean
A look back at some of 2014’s biggest enterprise security stories, and what we’ve learned from them