Security
News & Commentary
5 Tips On How To Prepare For A Data Breach
Claire Giordano, Senior Director of Emerging Storage Markets |  QuantumCommentary
If you are a financial institution your cyber security defenses will be breached -- again and again. Here are five tips to respond quickly and minimize damage.
By Claire Giordano Senior Director of Emerging Storage Markets | Quantum,
Comment0 comments  |  Read  |  Post a Comment
Voice Biometrics Improve Transaction Monitoring Fraud Detection
Wesley Wilhelm, Lead Fraud Subject Matter Expert, Risk & Fraud Management, NICE ActimizeCommentary
Why voice biometrics should be a part of your fraud prevention strategy in the call center.
By Wesley Wilhelm Lead Fraud Subject Matter Expert, Risk & Fraud Management, NICE Actimize,
Comment0 comments  |  Read  |  Post a Comment
Verifying Behavior, Not Input, to Detect Sophisticated Attacks
Becca Lipman, Senior EditorCommentary
Understanding how users interact with the touch points with biometric information is an increasingly important part of digital security.
By Becca Lipman Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
9 Reasons Cloud Security Will Advance in 2015
Rajiv Gupta, CEO & Co-founder, Skyhigh NetworksCommentary
The CEO and CISO become BFFs, and other cloud security predictions for 2015.
By Rajiv Gupta CEO & Co-founder, Skyhigh Networks,
Comment0 comments  |  Read  |  Post a Comment
Boardrooms Are a Critical Line of Defense for Cybersecurity Preparation
Jeffry Powell, EVP, Americas | Diligent Board Member ServicesCommentary
Directors who are familiar with their company’s IT department are better able to determine whether the team is equipped to effectively address cybersecurity.
By Jeffry Powell EVP, Americas | Diligent Board Member Services,
Comment2 comments  |  Read  |  Post a Comment
Neglecting SAP Security Could Cost $22M Per Minute
Juan Perez-Etchegoyen, CTO, OnapsisCommentary
SAP systems has grown in complexity, making it difficult but essential to secure the interconnected parts.
By Juan Perez-Etchegoyen CTO, Onapsis,
Comment1 Comment  |  Read  |  Post a Comment
5 Common Misconceptions About BYOD
Becca Lipman, Senior EditorCommentary
These are the five most common myths about BYOD, according to Vox Mobile's Andrew Bisesi.
By Becca Lipman Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
Facial Analysis: Wall Street's Next Big-Data Tool
Jeff Bertolucci,
Researchers at the New Jersey Institute of Technology are analyzing facial expressions of corporate execs, as well as other data streams, to forecast stock market trends.
By Jeff Bertolucci ,
Comment9 comments  |  Read  |  Post a Comment
'Enlightened' Non-IT Execs More Likely To Run Secure Organization
Becca Lipman, Senior EditorCommentary
Do senior executives understand their role in data security? On the whole, unsurprisingly, no.
By Becca Lipman Senior Editor,
Comment9 comments  |  Read  |  Post a Comment
You’re Doing BYOD Wrong: These Numbers Prove It
Bogdan Botezatu, Senior E-threat Analyst, BitdefenderCommentary
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender,
Comment0 comments  |  Read  |  Post a Comment
The Focus on Data Security Shapes 2015 Hedge Fund Tech Trends
Grigoriy Milis, Chief Technology Officer, Richard Fleischman & Associates (RFA)Commentary
With tougher penalties associated with exposure of client information on the horizon, firms will need to examine the steps they must take to protect this data from attack.
By Grigoriy Milis Chief Technology Officer, Richard Fleischman & Associates (RFA),
Comment2 comments  |  Read  |  Post a Comment
This Week in 60 Seconds: Net Neutrality, IT Hiring
Andrew Conry Murray, Director of Content & Community, Interop
Our video wrap-up shares how to win net neutrality, wades into the debate over an IT talent shortage, and more.
By Andrew Conry Murray Director of Content & Community, Interop,
Comment6 comments  |  Read  |  Post a Comment
CFTC Increases Cyber Security Oversight for Market Structure Entities
Greg MacSweeney, Editorial DirectorNews
Tomothy Massad, the new CFTC chairman, tells derivatives exchanges and clearinghouses they need to strengthen cyber security planning and procedures.
By Greg MacSweeney Editorial Director,
Comment4 comments  |  Read  |  Post a Comment
Banks, Bitcoin & the Blockchain
Jonathan Camhi, Associate Editor, Bank Systems and TechnologyNews
The Bitcoin Blockchain could offer benefits to banks that are willing to experiment with it.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Breach Fatigue Sets In With Consumers
Ericka Chickowski, Contributing Writer, Dark ReadingCommentary
Report from Ponemon and RSA shows that consumers aren't really adjusting behavior due to mega breaches.
By Ericka Chickowski Contributing Writer, Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Cyber Risk Is a Top Concern, 84% Tell DTCC
Ivy Schmerken, Editor at LargeNews
DTCC released its recent "Systemic Risk Barometer" survey showing that cyber risk is among the global financial industry's top five concerns, along with the impact of new regulations.
By Ivy Schmerken Editor at Large,
Comment17 comments  |  Read  |  Post a Comment
Application Whitelisting Increasingly Applied in Cyber Security
Becca Lipman, Senior EditorCommentary
Innovations in application whitelisting solutions are helping IT teams more efficiently and flexibly automate and manage lists of approved applications.
By Becca Lipman Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts
Sara Peters, Senior Editor at Dark ReadingNews
Proofpoint report shows how one Russian-speaking criminal organization hides from security companies.
By Sara Peters Senior Editor at Dark Reading,
Comment1 Comment  |  Read  |  Post a Comment
First Cryptography Advisory Board Formed for Cloud Security
Becca Lipman, Senior EditorNews
Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality.
By Becca Lipman Senior Editor,
Comment11 comments  |  Read  |  Post a Comment
6 Security Strategies for Mobile Employees
Deena Coffman, CEO, IDT911 ConsultingCommentary
Six mobility rules for employees moving between offices, meeting customers offsite, and traveling to business functions.
By Deena Coffman CEO, IDT911 Consulting,
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Street Tweets
PR Newswire
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.