News & Commentary
Latest Content tagged with Security
Page 1 / 2   >   >>
Morgan Stanley Data Theft Exposes Insider Threat & Need for More Restrictions
News  |  1/14/2015  | 
In the wake of Morgan Stanley firing a financial adviser for stealing information on 350,000 wealth management clients, experts say financial firms need to "cloak and contain" access to valuable data.
4 Mobile Security Predictions for 2015
Commentary  |  1/8/2015  | 
As we look ahead, mobility is the perfect breeding ground for attacks in 2015.
Increasing Cyberthreats Pose Massive Challenge for Financial Firms
News  |  1/8/2015  | 
Capital Markets Outlook 2015: Financial firms will increase data security spending and also strengthen critical infrastructure as the industry struggles to keep up with the scale and intensity of cyber attacks.
How Fraud & Cyber Security Will Evolve in 2015
Commentary  |  1/6/2015  | 
Banks need to implement new security measures and tactics, and fraudsters are sure to respond by changing their operations.
IEX Bolsters Information Security With Top Hire From BlackRock
News  |  1/5/2015  | 
Benjamin Smith joined IEX as the private trading venue's head of information security last week. In a Q&A, Smith discusses his new role, Regulation SCI, and what exchanges and ATSs can do to combat hackers in 2015.
5 Tips On How To Prepare For A Data Breach
Commentary  |  12/19/2014  | 
If you are a financial institution your cyber security defenses will be breached -- again and again. Here are five tips to respond quickly and minimize damage.
Voice Biometrics Improve Transaction Monitoring Fraud Detection
Commentary  |  12/16/2014  | 
Why voice biometrics should be a part of your fraud prevention strategy in the call center.
Verifying Behavior, Not Input, to Detect Sophisticated Attacks
Commentary  |  12/11/2014  | 
Understanding how users interact with the touch points with biometric information is an increasingly important part of digital security.
9 Reasons Cloud Security Will Advance in 2015
Commentary  |  12/11/2014  | 
The CEO and CISO become BFFs, and other cloud security predictions for 2015.
Boardrooms Are a Critical Line of Defense for Cybersecurity Preparation
Commentary  |  12/10/2014  | 
Directors who are familiar with their companyís IT department are better able to determine whether the team is equipped to effectively address cybersecurity.
Neglecting SAP Security Could Cost $22M Per Minute
Commentary  |  12/10/2014  | 
SAP systems has grown in complexity, making it difficult but essential to secure the interconnected parts.
5 Common Misconceptions About BYOD
Commentary  |  12/8/2014  | 
These are the five most common myths about BYOD, according to Vox Mobile's Andrew Bisesi.
'Enlightened' Non-IT Execs More Likely To Run Secure Organization
Commentary  |  11/21/2014  | 
Do senior executives understand their role in data security? On the whole, unsurprisingly, no.
Youíre Doing BYOD Wrong: These Numbers Prove It
Commentary  |  11/20/2014  | 
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
The Focus on Data Security Shapes 2015 Hedge Fund Tech Trends
Commentary  |  11/17/2014  | 
With tougher penalties associated with exposure of client information on the horizon, firms will need to examine the steps they must take to protect this data from attack.
CFTC Increases Cyber Security Oversight for Market Structure Entities
News  |  11/6/2014  | 
Tomothy Massad, the new CFTC chairman, tells derivatives exchanges and clearinghouses they need to strengthen cyber security planning and procedures.
Banks, Bitcoin & the Blockchain
News  |  11/5/2014  | 
The Bitcoin Blockchain could offer benefits to banks that are willing to experiment with it.
Breach Fatigue Sets In With Consumers
Commentary  |  11/4/2014  | 
Report from Ponemon and RSA shows that consumers aren't really adjusting behavior due to mega breaches.
Cyber Risk Is a Top Concern, 84% Tell DTCC
News  |  10/23/2014  | 
DTCC released its recent "Systemic Risk Barometer" survey showing that cyber risk is among the global financial industry's top five concerns, along with the impact of new regulations.
Application Whitelisting Increasingly Applied in Cyber Security
Commentary  |  10/13/2014  | 
Innovations in application whitelisting solutions are helping IT teams more efficiently and flexibly automate and manage lists of approved applications.
How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts
News  |  10/9/2014  | 
Proofpoint report shows how one Russian-speaking criminal organization hides from security companies.
First Cryptography Advisory Board Formed for Cloud Security
News  |  10/2/2014  | 
Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality.
6 Security Strategies for Mobile Employees
Commentary  |  9/26/2014  | 
Six mobility rules for employees moving between offices, meeting customers offsite, and traveling to business functions.
Behavior Biometrics a Popular Defense Against Cyberthreats
Commentary  |  9/25/2014  | 
Banks are capturing behavioral data like swipes, typing cadence, and mouse patterns to identify fraudulent account activity.
Encrypting Cloud Email Isnít as Easy as You'd Think
News  |  9/25/2014  | 
Fund managers need to consider who holds the encryption keys for cloud-based email, or face potential legal risks.
Hacking the Hackers: The Legal Risks of Taking Matters Into Private Hands
Commentary  |  9/23/2014  | 
Private groups are beginning to fight back against foreign sources of malware and credit fraud, but methodologies put these digital crusaders and their employers at serious legal risk.
Gartner: 75% of Mobile Apps Will Fail Security Tests Through 2015
Commentary  |  9/18/2014  | 
The rise of BYOD means enterprises must implement security testing and containment solutions, according to new Gartner research.
Leaving Out the Welcome Mat for Financial Services Hackers
Commentary  |  9/11/2014  | 
Everyone knows the financial services industry is a prime target for hackers. Despite the dangers, many applications have software vulnerabilities that expose real risks.
4 Surprising Ways Firms Think About Data Security Costs
Commentary  |  9/10/2014  | 
Almost 28% of firms are willing to bear the cost of some financial losses due to cybercrime, because it's less than the cost of upgrading IT systems.
Will Apple Legitimize Mobile Payments?
Commentary  |  9/9/2014  | 
The company announced its new mobile payments system, Apple Pay, during a news media event today.
Mobile First: Why Mobile Security Should Not Be Your Concern
Commentary  |  9/5/2014  | 
Todayís platform developers plan for mobile enterprise applications with the highest levels of security and access control. Soon the enterprise's issue of mobile security will become moot.
Phishing Scams at All-Time High, Employee Training Not Keeping Pace
Commentary  |  9/3/2014  | 
Phishing attacks arenít going away any time soon. The mindset that eventually someone will find a technology that prevents this type of attack is wishful thinking.
Is Your Corporate Data Being Auctioned on eBay?
Commentary  |  9/2/2014  | 
Researchers purchased 20 used Android phones to see what data they could retrieve using off-the-shelf recovery software. The results were astonishing.
Don't Be Surprised by a Cyber Attack: Prepare, Respond, Recover
News  |  9/2/2014  | 
Cyber attacks have become inevitable, but companies that prepare for how to respond can "shrink the problem" and minimize the impact of any security breach.
Hedge Funds Raise the Urgency Level on Cyber Security
News  |  8/28/2014  | 
Hedge funds are bracing for SEC exams on cyber security preparedness in 2014, but do they need a chief information security officer?
Russian Hack Attack on Banks: Is This the Big One?
News  |  8/28/2014  | 
JPMorgan Chase and at least four other US banks have been hit by a series of coordinated attacks on account information. Was it inevitable?
BYOD Policy: Don't Reinvent the Wheel
Commentary  |  8/27/2014  | 
Financial firms still feel overwhelmed by BYOD risks and challenges. But these can be addressed by a good policy, and the guidelines are already out there.
Business Continuity 2.0: Weíre Gonna Need a Bigger Boat
Commentary  |  8/22/2014  | 
What would happen with a long-term outage to financial systems or the nationís critical infrastructure? Businesses arenít even close to being prepared.
Driving Information Security, From Silicon Valley to Detroit
Commentary  |  8/20/2014  | 
As software interacts with more and more of our daily lives, technology providers may be liable for more damages than they have in the recent past.
The 10 Hottest Cloud Apps on Wall Street
Slideshows  |  8/12/2014  | 
Your IT team may not have heard of them.
LEI + COU = GLEIS
Commentary  |  8/12/2014  | 
The legal entity identifier (LEI) project has been off to a rough start. The newly installed board of the Global Legal Entity Identifier Foundation (GLEIF) intends to bring structure and guidance.
What Are the True Costs of Data Breaches?
News  |  8/10/2014  | 
The cost associated with data breaches extends far beyond just the information that was stolen.
Financial Service Employees Ranked 2nd-Riskiest Users of Cloud Services
Commentary  |  8/7/2014  | 
Skyhigh Networks reports that financial services demonstrated some of the most risky behaviors among major industries.
Managing Mobile Risk in the Cloud
Commentary  |  8/1/2014  | 
Firms should assess their apps and data being exposed to the cloud for the level of security, privacy robustness, and frequency of development updates they require.
Shore Up Cyber Security Now
Commentary  |  7/29/2014  | 
Knowing that a data breach can and will happen at some point, asset management firms can manage new operational and regulatory risk with a layered approach to cyber security.
SEC Eyes Cyber-Security Planning
News  |  7/22/2014  | 
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.
Vigilante Justice on the Digital Frontier
Commentary  |  7/14/2014  | 
In the face of slow government action, Wild West-style justice has moved to the digital realm, and private organizations risk being caught in the crossfire.
Security Beyond the Firewall
Commentary  |  7/14/2014  | 
With more and more mobile devices in use each day, the traditional corporate firewall's limits have been exposed.
The Frontline Value of ERP security
Commentary  |  7/11/2014  | 
The critical nature of the business process systems means that when it comes to safeguarding, ERP often merits a bit more care.
Former FBI Agent Talks Cyber Security With Deloitte
Commentary  |  6/27/2014  | 
Vigilance can take security only so far. It's time to focus on resilience.
Page 1 / 2   >   >>


Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Video
Exclusive: Inside the GETCO Execution Services Trading Floor
Exclusive: Inside the GETCO Execution Services Trading Floor
Advanced Trading takes you on an exclusive tour of the New York trading floor of GETCO Execution Services, the solutions arm of GETCO.