Security
News & Commentary
Cyber Risk Is a Top Concern, 84% Tell DTCC
Ivy Schmerken, Editor at LargeNews
DTCC released its recent "Systemic Risk Barometer" survey showing that cyber risk is among the global financial industry's top five concerns, along with the impact of new regulations.
By Ivy Schmerken Editor at Large,
Comment2 comments  |  Read  |  Post a Comment
Application Whitelisting Increasingly Applied in Cyber Security
Becca Lipman, Senior EditorCommentary
Innovations in application whitelisting solutions are helping IT teams more efficiently and flexibly automate and manage lists of approved applications.
By Becca Lipman Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts
Sara Peters, Senior Editor at Dark ReadingNews
Proofpoint report shows how one Russian-speaking criminal organization hides from security companies.
By Sara Peters Senior Editor at Dark Reading,
Comment1 Comment  |  Read  |  Post a Comment
First Cryptography Advisory Board Formed for Cloud Security
Becca Lipman, Senior EditorNews
Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality.
By Becca Lipman Senior Editor,
Comment4 comments  |  Read  |  Post a Comment
6 Security Strategies for Mobile Employees
Deena Coffman, CEO, IDT911 ConsultingCommentary
Six mobility rules for employees moving between offices, meeting customers offsite, and traveling to business functions.
By Deena Coffman CEO, IDT911 Consulting,
Comment0 comments  |  Read  |  Post a Comment
Behavior Biometrics a Popular Defense Against Cyberthreats
Becca Lipman, Senior EditorCommentary
Banks are capturing behavioral data like swipes, typing cadence, and mouse patterns to identify fraudulent account activity.
By Becca Lipman Senior Editor,
Comment6 comments  |  Read  |  Post a Comment
Encrypting Cloud Email Isnít as Easy as You'd Think
Ivy Schmerken, Editor at LargeNews
Fund managers need to consider who holds the encryption keys for cloud-based email, or face potential legal risks.
By Ivy Schmerken Editor at Large,
Comment5 comments  |  Read  |  Post a Comment
Hacking the Hackers: The Legal Risks of Taking Matters Into Private Hands
Becca Lipman, Senior EditorCommentary
Private groups are beginning to fight back against foreign sources of malware and credit fraud, but methodologies put these digital crusaders and their employers at serious legal risk.
By Becca Lipman Senior Editor,
Comment19 comments  |  Read  |  Post a Comment
Gartner: 75% of Mobile Apps Will Fail Security Tests Through 2015
Jonathan Camhi, Associate Editor, Bank Systems and TechnologyCommentary
The rise of BYOD means enterprises must implement security testing and containment solutions, according to new Gartner research.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment4 comments  |  Read  |  Post a Comment
Leaving Out the Welcome Mat for Financial Services Hackers
Lev Lesokhin, Executive Vice President, CAST SoftwareCommentary
Everyone knows the financial services industry is a prime target for hackers. Despite the dangers, many applications have software vulnerabilities that expose real risks.
By Lev Lesokhin Executive Vice President, CAST Software,
Comment6 comments  |  Read  |  Post a Comment
4 Surprising Ways Firms Think About Data Security Costs
Becca Lipman, Senior EditorCommentary
Almost 28% of firms are willing to bear the cost of some financial losses due to cybercrime, because it's less than the cost of upgrading IT systems.
By Becca Lipman Senior Editor,
Comment13 comments  |  Read  |  Post a Comment
Will Apple Legitimize Mobile Payments?
Bryan Yurcan, Associate Editor, Bank Systems and TechnologyCommentary
The company announced its new mobile payments system, Apple Pay, during a news media event today.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Mobile First: Why Mobile Security Should Not Be Your Concern
Matthew Calkins, President & CEO, AppianCommentary
Todayís platform developers plan for mobile enterprise applications with the highest levels of security and access control. Soon the enterprise's issue of mobile security will become moot.
By Matthew Calkins President & CEO, Appian,
Comment0 comments  |  Read  |  Post a Comment
Phishing Scams at All-Time High, Employee Training Not Keeping Pace
Joe Ferrara, President and CEO of Wombat Security TechnologiesCommentary
Phishing attacks arenít going away any time soon. The mindset that eventually someone will find a technology that prevents this type of attack is wishful thinking.
By Joe Ferrara President and CEO of Wombat Security Technologies,
Comment2 comments  |  Read  |  Post a Comment
Is Your Corporate Data Being Auctioned on eBay?
Omer Eiferman, CEO of CellroxCommentary
Researchers purchased 20 used Android phones to see what data they could retrieve using off-the-shelf recovery software. The results were astonishing.
By Omer Eiferman CEO of Cellrox,
Comment7 comments  |  Read  |  Post a Comment
Don't Be Surprised by a Cyber Attack: Prepare, Respond, Recover
Ivy Schmerken, Editor at LargeNews
Cyber attacks have become inevitable, but companies that prepare for how to respond can "shrink the problem" and minimize the impact of any security breach.
By Ivy Schmerken Editor at Large,
Comment0 comments  |  Read  |  Post a Comment
Hedge Funds Raise the Urgency Level on Cyber Security
Ivy Schmerken, Editor at LargeNews
Hedge funds are bracing for SEC exams on cyber security preparedness in 2014, but do they need a chief information security officer?
By Ivy Schmerken Editor at Large,
Comment9 comments  |  Read  |  Post a Comment
Russian Hack Attack on Banks: Is This the Big One?
Kathy Burger, Editorial DirectorNews
JPMorgan Chase and at least four other US banks have been hit by a series of coordinated attacks on account information. Was it inevitable?
By Kathy Burger Editorial Director,
Comment0 comments  |  Read  |  Post a Comment
BYOD Policy: Don't Reinvent the Wheel
Becca Lipman, Senior EditorCommentary
Financial firms still feel overwhelmed by BYOD risks and challenges. But these can be addressed by a good policy, and the guidelines are already out there.
By Becca Lipman Senior Editor,
Comment17 comments  |  Read  |  Post a Comment
Business Continuity 2.0: Weíre Gonna Need a Bigger Boat
Mitchel Kraskin, Co-founder and CEO, Compliance ScienceCommentary
What would happen with a long-term outage to financial systems or the nationís critical infrastructure? Businesses arenít even close to being prepared.
By Mitchel Kraskin Co-founder and CEO, Compliance Science,
Comment12 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Street Tweets
PR Newswire
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.