Security
News & Commentary
6 Security Strategies for Mobile Employees
Deena Coffman, CEO, IDT911 ConsultingCommentary
Six mobility rules for employees moving between offices, meeting customers offsite, and traveling to business functions.
By Deena Coffman CEO, IDT911 Consulting,
Comment0 comments  |  Read  |  Post a Comment
Behavior Biometrics a Popular Defense Against Cyberthreats
Becca Lipman, Senior EditorCommentary
Banks are capturing behavioral data like swipes, typing cadence, and mouse patterns to identify fraudulent account activity.
By Becca Lipman Senior Editor,
Comment3 comments  |  Read  |  Post a Comment
Encrypting Cloud Email Isnít as Easy as You'd Think
Ivy Schmerken, Editor at LargeNews
Fund managers need to consider who holds the encryption keys for cloud-based email, or face potential legal risks.
By Ivy Schmerken Editor at Large,
Comment4 comments  |  Read  |  Post a Comment
Hacking the Hackers: The Legal Risks of Taking Matters Into Private Hands
Becca Lipman, Senior EditorCommentary
Private groups are beginning to fight back against foreign sources of malware and credit fraud, but methodologies put these digital crusaders and their employers at serious legal risk.
By Becca Lipman Senior Editor,
Comment19 comments  |  Read  |  Post a Comment
Gartner: 75% of Mobile Apps Will Fail Security Tests Through 2015
Jonathan Camhi, Associate Editor, Bank Systems and TechnologyCommentary
The rise of BYOD means enterprises must implement security testing and containment solutions, according to new Gartner research.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment4 comments  |  Read  |  Post a Comment
Leaving Out the Welcome Mat for Financial Services Hackers
Lev Lesokhin, Executive Vice President, CAST SoftwareCommentary
Everyone knows the financial services industry is a prime target for hackers. Despite the dangers, many applications have software vulnerabilities that expose real risks.
By Lev Lesokhin Executive Vice President, CAST Software,
Comment3 comments  |  Read  |  Post a Comment
4 Surprising Ways Firms Think About Data Security Costs
Becca Lipman, Senior EditorCommentary
Almost 28% of firms are willing to bear the cost of some financial losses due to cybercrime, because it's less than the cost of upgrading IT systems.
By Becca Lipman Senior Editor,
Comment8 comments  |  Read  |  Post a Comment
Will Apple Legitimize Mobile Payments?
Bryan Yurcan, Associate Editor, Bank Systems and TechnologyCommentary
The company announced its new mobile payments system, Apple Pay, during a news media event today.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Mobile First: Why Mobile Security Should Not Be Your Concern
Matthew Calkins, President & CEO, AppianCommentary
Todayís platform developers plan for mobile enterprise applications with the highest levels of security and access control. Soon the enterprise's issue of mobile security will become moot.
By Matthew Calkins President & CEO, Appian,
Comment0 comments  |  Read  |  Post a Comment
Phishing Scams at All-Time High, Employee Training Not Keeping Pace
Joe Ferrara, President and CEO of Wombat Security TechnologiesCommentary
Phishing attacks arenít going away any time soon. The mindset that eventually someone will find a technology that prevents this type of attack is wishful thinking.
By Joe Ferrara President and CEO of Wombat Security Technologies,
Comment2 comments  |  Read  |  Post a Comment
Is Your Corporate Data Being Auctioned on eBay?
Omer Eiferman, CEO of CellroxCommentary
Researchers purchased 20 used Android phones to see what data they could retrieve using off-the-shelf recovery software. The results were astonishing.
By Omer Eiferman CEO of Cellrox,
Comment7 comments  |  Read  |  Post a Comment
Don't Be Surprised by a Cyber Attack: Prepare, Respond, Recover
Ivy Schmerken, Editor at LargeNews
Cyber attacks have become inevitable, but companies that prepare for how to respond can "shrink the problem" and minimize the impact of any security breach.
By Ivy Schmerken Editor at Large,
Comment0 comments  |  Read  |  Post a Comment
Hedge Funds Raise the Urgency Level on Cyber Security
Ivy Schmerken, Editor at LargeNews
Hedge funds are bracing for SEC exams on cyber security preparedness in 2014, but do they need a chief information security officer?
By Ivy Schmerken Editor at Large,
Comment9 comments  |  Read  |  Post a Comment
Russian Hack Attack on Banks: Is This the Big One?
Kathy Burger, Editorial DirectorNews
JPMorgan Chase and at least four other US banks have been hit by a series of coordinated attacks on account information. Was it inevitable?
By Kathy Burger Editorial Director,
Comment0 comments  |  Read  |  Post a Comment
BYOD Policy: Don't Reinvent the Wheel
Becca Lipman, Senior EditorCommentary
Financial firms still feel overwhelmed by BYOD risks and challenges. But these can be addressed by a good policy, and the guidelines are already out there.
By Becca Lipman Senior Editor,
Comment17 comments  |  Read  |  Post a Comment
Business Continuity 2.0: Weíre Gonna Need a Bigger Boat
Mitchel Kraskin, Co-founder and CEO, Compliance ScienceCommentary
What would happen with a long-term outage to financial systems or the nationís critical infrastructure? Businesses arenít even close to being prepared.
By Mitchel Kraskin Co-founder and CEO, Compliance Science,
Comment12 comments  |  Read  |  Post a Comment
Driving Information Security, From Silicon Valley to Detroit
Christopher Camejo, Director of Assessment Services, NTT Com SecurityCommentary
As software interacts with more and more of our daily lives, technology providers may be liable for more damages than they have in the recent past.
By Christopher Camejo Director of Assessment Services, NTT Com Security,
Comment2 comments  |  Read  |  Post a Comment
The 10 Hottest Cloud Apps on Wall Street
Becca Lipman, Senior Editor
Your IT team may not have heard of them.
By Becca Lipman Senior Editor,
Comment5 comments  |  Read  |  Post a Comment
LEI + COU = GLEIS
Allan Grody, President of Financial Intergroup Holdings LtdCommentary
The legal entity identifier (LEI) project has been off to a rough start. The newly installed board of the Global Legal Entity Identifier Foundation (GLEIF) intends to bring structure and guidance.
By Allan Grody President of Financial Intergroup Holdings Ltd,
Comment5 comments  |  Read  |  Post a Comment
What Are the True Costs of Data Breaches?
Bryan Yurcan, Associate Editor, Bank Systems and TechnologyNews
The cost associated with data breaches extends far beyond just the information that was stolen.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Byurcan
Current Conversations How true
In reply to: Re: A real dilemma
Post Your Own Reply
More Conversations
Street Tweets
PR Newswire
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.