Outsourcing Trends on Wall Street: Changing Attitudes
When considering outsourcing vendors, it is important to analyze the intangibles — to look beyond cost, schedule and compliance. The right partner should be of comparable size; for mid-size buyers, global brands most often do not translate to quality.
Auditors Not Okay With Rampant Secure Shell Key Mismanagement
Software that provides a risk and compliance report for Secure Shell environments continues to show large-scale security violations across the industry. Auditors, who are also armed with the software, are not taking kindly to the old habit of leaving forgotten access codes lying around.
The Big Joke About Big Data
If you want your big data strategy to succeed, you must realize that it involves much more than just weblog data.
Top 7 Financial Services Hacks By The Numbers
Are you up to date on the latest string of hacks and thefts that have cost financial institutions multimillions of dollars? From Anonymous's hactivism to the most recent credit card scandal, here are the most interesting 2013 data breaches to hit the headlines.
Are Banks Pushing to Weaken Dodd-Frank?
Goldman Sachs, JPMorgan and other top investment firms have had more meetings with regulators than with reform groups. Wanna bet what they were talking about?
Building A Big Diverse Data Platform For Wall Street
Although there is no one panacea for increasing the analytical quotient in capital markets and there is no big data analytics in a box, there are, however, components or architectural ingredients that are essential in getting value throughout the information supply chain.
Will the REAL OEMS Please Stand Up?
Many firms claim to offer an OEMS, yet there is no precise definition. Here are the top 10 features that an OEMS must have to qualify for the coveted moniker.
Quantum Dawn 2: The Aftermath
With cyber attacks being one of the biggest threats to financial institutions, cyber exercises like Quantum Dawn 2 and other security measures become imperative.
Social Media Hacks, Will We Fall For the Same Tricks Again?
A recent breach of the Nasdaq bulletin boards reminds us that hackers are applying an endless stream of attacks. It begs the question, have any steps been made to protect algo traders from foul play in social media, including another AP twitter hack?
Document Risk: Taming the Paper Tiger
Thanks to new regulations - written more often in gray than black white - investment firms are suffering from document risk, or poorly archived documents and information. While it may not have the white-hot urgency of liquidity or credit risk, document risk is still a source of confusion for today’s firms. WST spoke with Mahesh Muthu, associate principal at eClerx, about the ways firms can stay ahead of their documentation dilemmas.
Is HFT Leveling the Playing Field?
As lawmakers look at high-frequency trading, firms continue to shave the time off of their trades. WST spoke with Azul Systems CEO Scott Sellers for his take on high frequency trading going forward. Is it still full steam ahead or are firms looking to back off?
Cybercrime On Wall Street
As the volume of cybersecurity incidents increases, financial services firms are developing their own intelligence-gathering units and cooperating with the federal government to defend against hacktivists, cybercriminals and other state-sponsored groups.
6 FinTech Winners Revealed
Large banks threw their support behind six budding financial technology companies, helping them integrate their tools and maximize value.
Change Doesn't Always Have To Be Hard
"Change Sourcing" helps banks transform their cost base by reducing overall project costs, leveraging offshore resources, providing cost predictability and improving cost efficiency and execution.
3 Ways IBOR Can Improve Alpha
Buy side firms rely on real-time data to help traders increase alpha and better interact with regulators. If an investment book of record is the best solution to date, its greatest triumph may lie in the discussion it's sparked.
The #1 Myth about Security Information and Event Management (SIEM)
Probably the most popular myth deceiving IT security professionals today is that Security Information and Event Management (SIEM) software is a sufficiently-robust solution for keeping a close eye on sensitive data and – and to send alerts when anything suspicious happens to it. However, SIEMs can only report on logs they can see - therefore another type of user activity monitoring software is needed to ensure data remains secure.