Security
News & Commentary
Business Continuity 2.0: Weíre Gonna Need a Bigger Boat
Mitchel Kraskin, Co-founder and CEO, Compliance ScienceCommentary
What would happen with a long-term outage to financial systems or the nationís critical infrastructure? Businesses arenít even close to being prepared.
By Mitchel Kraskin Co-founder and CEO, Compliance Science,
Comment3 comments  |  Read  |  Post a Comment
Driving Information Security, From Silicon Valley to Detroit
Christopher Camejo, Director of Assessment Services, NTT Com SecurityCommentary
As software interacts with more and more of our daily lives, technology providers may be liable for more damages than they have in the recent past.
By Christopher Camejo Director of Assessment Services, NTT Com Security,
Comment1 Comment  |  Read  |  Post a Comment
The 10 Hottest Cloud Apps on Wall Street
Becca Lipman, Senior Editor
Your IT team may not have heard of them.
By Becca Lipman Senior Editor,
Comment3 comments  |  Read  |  Post a Comment
LEI + COU = GLEIS
Allan Grody, President of Financial Intergroup Holdings LtdCommentary
The legal entity identifier (LEI) project has been off to a rough start. The newly installed board of the Global Legal Entity Identifier Foundation (GLEIF) intends to bring structure and guidance.
By Allan Grody President of Financial Intergroup Holdings Ltd,
Comment5 comments  |  Read  |  Post a Comment
What Are the True Costs of Data Breaches?
Bryan Yurcan, Associate Editor, Bank Systems and TechnologyNews
The cost associated with data breaches extends far beyond just the information that was stolen.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Financial Service Employees Ranked 2nd-Riskiest Users of Cloud Services
Becca Lipman, Senior EditorCommentary
Skyhigh Networks reports that financial services demonstrated some of the most risky behaviors among major industries.
By Becca Lipman Senior Editor,
Comment4 comments  |  Read  |  Post a Comment
Managing Mobile Risk in the Cloud
Andrew Waxman, Thought LeaderCommentary
Firms should assess their apps and data being exposed to the cloud for the level of security, privacy robustness, and frequency of development updates they require.
By Andrew Waxman Thought Leader,
Comment4 comments  |  Read  |  Post a Comment
Shore Up Cyber Security Now
Patrick Mullevey, Executive Director, Cloud Services & Support, GravitasCommentary
Knowing that a data breach can and will happen at some point, asset management firms can manage new operational and regulatory risk with a layered approach to cyber security.
By Patrick Mullevey Executive Director, Cloud Services & Support, Gravitas,
Comment0 comments  |  Read  |  Post a Comment
SEC Eyes Cyber-Security Planning
Ivy Schmerken, Editor at LargeNews
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.
By Ivy Schmerken Editor at Large,
Comment8 comments  |  Read  |  Post a Comment
Vigilante Justice on the Digital Frontier
Christopher Camejo, Director of Assessment Services, NTT Com SecurityCommentary
In the face of slow government action, Wild West-style justice has moved to the digital realm, and private organizations risk being caught in the crossfire.
By Christopher Camejo Director of Assessment Services, NTT Com Security,
Comment3 comments  |  Read  |  Post a Comment
Security Beyond the Firewall
Greg MacSweeney, Editorial DirectorCommentary
With more and more mobile devices in use each day, the traditional corporate firewall's limits have been exposed.
By Greg MacSweeney Editorial Director,
Comment0 comments  |  Read  |  Post a Comment
The Frontline Value of ERP security
Juan Perez-Etchegoyen, CTO, OnapsisCommentary
The critical nature of the business process systems means that when it comes to safeguarding, ERP often merits a bit more care.
By Juan Perez-Etchegoyen CTO, Onapsis,
Comment1 Comment  |  Read  |  Post a Comment
Former FBI Agent Talks Cyber Security With Deloitte
Becca Lipman, Senior EditorCommentary
Vigilance can take security only so far. It's time to focus on resilience.
By Becca Lipman Senior Editor,
Comment8 comments  |  Read  |  Post a Comment
Cybersecurity Lessons from Former FBI Director
Kelly Sheridan, Associate Editor, Insurance & TechnologyCommentary
Robert Mueller describes how security initiatives within the Bureau are applicable to financial services.
By Kelly Sheridan Associate Editor, Insurance & Technology,
Comment2 comments  |  Read  |  Post a Comment
Bank Fraud: Itís Not Personal, Just Business
Christopher Camejo, Director of Assessment Services, NTT Com SecurityCommentary
Less publicized (but nonetheless costly) incidents of fraud, questions of liability, and mixed success in court complicate the allocation of security resources.
By Christopher Camejo Director of Assessment Services, NTT Com Security,
Comment7 comments  |  Read  |  Post a Comment
Why Secure the ERP Jewels in Paper Vaults?
Mariano Nunez, CEO and co-founder of OnapsisCommentary
Enterprise resource planning systems are among the most critical for any organization. That makes them very attractive and rewarding targets for attack. Are generic security measures appropriate?
By Mariano Nunez CEO and co-founder of Onapsis,
Comment1 Comment  |  Read  |  Post a Comment
Anti-Malware Doesnít Cut It in the Mobile Era
Mike Raggo, Contributing WriterCommentary
As operating system architectures shift from open file systems to application sandboxes, traditional anti-virus becomes less relevant. Enterprise mobility management provides both proactive countermeasures and reactive mitigation.
By Mike Raggo Contributing Writer,
Comment4 comments  |  Read  |  Post a Comment
Navigating Cloud Security: 3 Questions to Ask
Todd Gottula, EVP & CTO, Advent SoftwareCommentary
Are you considering a cloud solution but not convinced? Be sure to ask providers about their investments in regulations and security.
By Todd Gottula EVP & CTO, Advent Software,
Comment5 comments  |  Read  |  Post a Comment
Twitter Rules Trustworthy Websites
Kristin Burnham, Senior Editor, InformationWeek.com
Social networks scored high in a new report on website privacy and security, while news companies scored the lowest.
By Kristin Burnham Senior Editor, InformationWeek.com,
Comment2 comments  |  Read  |  Post a Comment
Mobile Security: Pinches Speak Louder Than Passwords
Jens Hinrichsen, Sr. Vice President, Business Development, NuData SecurityCommentary
Risk and security professionals hold the analgesic for the pains the C-Suite is feeling when it comes to mobile security.
By Jens Hinrichsen Sr. Vice President, Business Development, NuData Security,
Comment10 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Street Tweets
PR Newswire
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - July 2014
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.