Security
News & Commentary
Youíre Doing BYOD Wrong: These Numbers Prove It
Bogdan Botezatu, Senior E-threat Analyst, BitdefenderCommentary
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender,
Comment0 comments  |  Read  |  Post a Comment
The Focus on Data Security Shapes 2015 Hedge Fund Tech Trends
Grigoriy Milis, Chief Technology Officer, Richard Fleischman & Associates (RFA)Commentary
With tougher penalties associated with exposure of client information on the horizon, firms will need to examine the steps they must take to protect this data from attack.
By Grigoriy Milis Chief Technology Officer, Richard Fleischman & Associates (RFA),
Comment0 comments  |  Read  |  Post a Comment
This Week in 60 Seconds: Net Neutrality, IT Hiring
Andrew Conry Murray, Director of Content & Community, Interop
Our video wrap-up shares how to win net neutrality, wades into the debate over an IT talent shortage, and more.
By Andrew Conry Murray Director of Content & Community, Interop,
Comment4 comments  |  Read  |  Post a Comment
CFTC Increases Cyber Security Oversight for Market Structure Entities
Greg MacSweeney, Editorial DirectorNews
Tomothy Massad, the new CFTC chairman, tells derivatives exchanges and clearinghouses they need to strengthen cyber security planning and procedures.
By Greg MacSweeney Editorial Director,
Comment4 comments  |  Read  |  Post a Comment
Banks, Bitcoin & the Blockchain
Jonathan Camhi, Associate Editor, Bank Systems and TechnologyNews
The Bitcoin Blockchain could offer benefits to banks that are willing to experiment with it.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Breach Fatigue Sets In With Consumers
Ericka Chickowski, Contributing Writer, Dark ReadingCommentary
Report from Ponemon and RSA shows that consumers aren't really adjusting behavior due to mega breaches.
By Ericka Chickowski Contributing Writer, Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Cyber Risk Is a Top Concern, 84% Tell DTCC
Ivy Schmerken, Editor at LargeNews
DTCC released its recent "Systemic Risk Barometer" survey showing that cyber risk is among the global financial industry's top five concerns, along with the impact of new regulations.
By Ivy Schmerken Editor at Large,
Comment17 comments  |  Read  |  Post a Comment
Application Whitelisting Increasingly Applied in Cyber Security
Becca Lipman, Senior EditorCommentary
Innovations in application whitelisting solutions are helping IT teams more efficiently and flexibly automate and manage lists of approved applications.
By Becca Lipman Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts
Sara Peters, Senior Editor at Dark ReadingNews
Proofpoint report shows how one Russian-speaking criminal organization hides from security companies.
By Sara Peters Senior Editor at Dark Reading,
Comment1 Comment  |  Read  |  Post a Comment
First Cryptography Advisory Board Formed for Cloud Security
Becca Lipman, Senior EditorNews
Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality.
By Becca Lipman Senior Editor,
Comment9 comments  |  Read  |  Post a Comment
6 Security Strategies for Mobile Employees
Deena Coffman, CEO, IDT911 ConsultingCommentary
Six mobility rules for employees moving between offices, meeting customers offsite, and traveling to business functions.
By Deena Coffman CEO, IDT911 Consulting,
Comment0 comments  |  Read  |  Post a Comment
Behavior Biometrics a Popular Defense Against Cyberthreats
Becca Lipman, Senior EditorCommentary
Banks are capturing behavioral data like swipes, typing cadence, and mouse patterns to identify fraudulent account activity.
By Becca Lipman Senior Editor,
Comment6 comments  |  Read  |  Post a Comment
Encrypting Cloud Email Isnít as Easy as You'd Think
Ivy Schmerken, Editor at LargeNews
Fund managers need to consider who holds the encryption keys for cloud-based email, or face potential legal risks.
By Ivy Schmerken Editor at Large,
Comment5 comments  |  Read  |  Post a Comment
Hacking the Hackers: The Legal Risks of Taking Matters Into Private Hands
Becca Lipman, Senior EditorCommentary
Private groups are beginning to fight back against foreign sources of malware and credit fraud, but methodologies put these digital crusaders and their employers at serious legal risk.
By Becca Lipman Senior Editor,
Comment19 comments  |  Read  |  Post a Comment
Gartner: 75% of Mobile Apps Will Fail Security Tests Through 2015
Jonathan Camhi, Associate Editor, Bank Systems and TechnologyCommentary
The rise of BYOD means enterprises must implement security testing and containment solutions, according to new Gartner research.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment4 comments  |  Read  |  Post a Comment
Leaving Out the Welcome Mat for Financial Services Hackers
Lev Lesokhin, Executive Vice President, CAST SoftwareCommentary
Everyone knows the financial services industry is a prime target for hackers. Despite the dangers, many applications have software vulnerabilities that expose real risks.
By Lev Lesokhin Executive Vice President, CAST Software,
Comment6 comments  |  Read  |  Post a Comment
4 Surprising Ways Firms Think About Data Security Costs
Becca Lipman, Senior EditorCommentary
Almost 28% of firms are willing to bear the cost of some financial losses due to cybercrime, because it's less than the cost of upgrading IT systems.
By Becca Lipman Senior Editor,
Comment13 comments  |  Read  |  Post a Comment
Will Apple Legitimize Mobile Payments?
Bryan Yurcan, Associate Editor, Bank Systems and TechnologyCommentary
The company announced its new mobile payments system, Apple Pay, during a news media event today.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Mobile First: Why Mobile Security Should Not Be Your Concern
Matthew Calkins, President & CEO, AppianCommentary
Todayís platform developers plan for mobile enterprise applications with the highest levels of security and access control. Soon the enterprise's issue of mobile security will become moot.
By Matthew Calkins President & CEO, Appian,
Comment0 comments  |  Read  |  Post a Comment
Phishing Scams at All-Time High, Employee Training Not Keeping Pace
Joe Ferrara, President and CEO of Wombat Security TechnologiesCommentary
Phishing attacks arenít going away any time soon. The mindset that eventually someone will find a technology that prevents this type of attack is wishful thinking.
By Joe Ferrara President and CEO of Wombat Security Technologies,
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Street Tweets
PR Newswire
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.