Posts by Ubong Kingsley-Udoh

Preventative Measures for the Next KRACK Attacks

Cybersecurity
By Ubong Kingsley-Udoh If we have been very circumspect as consumers of the Internet, the vulnerability of WI-FI networks wouldn’t come to us a surprise. WI-FI has always been a vulnerability vector and a huge medium of compromise against end-users and businesses alike. In 2016, Mathy Vanhoef and Frank Piessens…

The Cybersecurity Poverty Line

Cybersecurity
By Ubong Kingsley-Udoh When it comes to security, with a special focus on cybersecurity, there are haves and the have-nots. The drab state of security in organisations is worth giving a second thought these days. As we begin to transition deeply in the use of new technologies — the cloud,…

Counterterrorism Tradecraft in Polymorphic Threat Mitigation

By Ubong Kingsley-Udoh For a while now, we have been inundated with news of breaches across the entire spectrum – from the enterprise to the public sector and it seems it wouldn’t abate anytime soon. The defacto reactionary measures put in place to mitigate polymorphic threats have failed immeasurably and…

The Password Policy Paradox

Insights
By Ubong Kingsley-Udoh If recent security breaches are anything to come by, the idea that password is the root of all digital evil wouldn’t fade away any time soon. From an enterprise perspective, resources within an organisation need to be restricted to authorised users, while individuals have a password in…

Mitigating Identity Theft

By Ubong Kingsley-Udoh Identity theft can simply be defined as the crime of obtaining another person’s personal or financial information in order to make unauthorised transactions, access accounts, create new accounts, or perform fraudulent activities. The oftenness of this crime has risen at a steady pace, and criminals often use…

A Maturity Primer for Vulnerability Coordination

Cybersecurity
By Ubong Kingsley-Udoh At the FDA Cyber Summit in Washington, DC in January 2016, issues concerning the security of medical devices & patient records were discussed and a couple of resolutions were passed by the key policy wonks/attendees/manufacturers during the summit. Make no mistake, I’m still of the opinion that…

Remediating a Security Incident

By Ubong Kingsley-Udoh The earlier signs that you have a security incident are neither white nor black. Most individuals and organisations approach a security incident in every imaginable way and it’s always a knee-jerk reaction. To remediating a security incident, a proper incident response plan should be established. In simpler…

Dirty Money in a Digital World

In the new digital economy – the advent of digital banking and cash management, criminals have perfected the art of moving money across continents at the speed of light and technological advances have made it difficult for law enforcement agencies to tackle it. If money laundering was a country, it…

Rethinking Risk and Enterprise Security in a Fierce Threat Landscape

By Ubong Kingsley-Udoh In the zest towards achieving wholesome digital transformation journeys, the modern security landscape is rapidly evolving. The emergence of apps, cloud services, big data, and mobile technology though quite revolutionary opens up newer vistas of risks as traditional network perimeters are fading away as businesses retrofit their…
Menu