25 October 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

5 ways Criminals hack your PC

4 hours ago  |  327 views  |  0  |  Recommends 0

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WILL succeed. When you operate on this assumption rather than thinking that your anti this and anti that are all you need, you’ll have the best cyber ...

TagsSecurity
Stephen BrownLANDESK - Utah

Should your organisation COPE with the COLD?

24 October 2014  |  670 views  |  0  |  Recommends 0

We’ve heard the acronym BYOD (Bring Your Own Device) for some time now, but less about ‘COPE’ – Corporate Owned, Personally Enabled devices; tablets, smartphones and laptops which are owned by the enterprise but used for personal purposes. However, both BYOD and COPE have failed to ring true in highly regulated industries such as financial service...

TagsSecurityMobile & online
More blog posts
Stephen MidgleyAbsolute Software - Vancouver

Working with your CIO to negotiate GRC - Part One

23 October 2014  |  992 views  |  0  |  Recommends 0

The increase in corporate mobile device use, fuelled by better technology and trends like Bring Your Own Device (BYOD) and enterprise focussed apps, means there are many more ways in which a business ...

TagsSecurity
Freddie McMahonAnomaly42 - London

Criminals exploit flawed correspondent banking

22 October 2014  |  958 views  |  0  |  Recommends 0

Modern correspondent banking - the process where one international bank conducts business transactions and facilitates wire payment transactions on behalf of another bank - is one of the main facilita...

TagsSecurityTransaction banking
Robert SicilianoIDTheftSecurity.com - Boston

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  718 views  |  0  |  Recommends 0

For anyone who goes online, it’s impossible to hack-proof yourself, but not impossible to make a hacker’s job extremely difficult. Here are three things to almost hack-proof yourself. Two-factor a...

TagsSecurity
Wendell BrockOutside Investment Advisors - McKinney

The New Cold War

21 October 2014  |  983 views  |  0  |  Recommends 0

The Economic Cold War or Financial Cold War has begun slowly over the past several years and the current administration has added fuel to the fire. China and Russia both know it would be extremely dif...

TagsSecurity
Adam OldfieldUnisys - Leeds

Payments: Securing future innovation

17 October 2014  |  1412 views  |  0  |  Recommends 0

The only things that are certain in life are death and taxes, or so Benjamin Franklin’s infamous quote goes. In today's financial services market we can safely add another certainty - change. It seems...

TagsSecurityPayments
Robert SicilianoIDTheftSecurity.com - Boston

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  626 views  |  0  |  Recommends 0

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineerin...

TagsSecurity
Reuven HarrisonTufin - London

Securing success in the finance sector

14 October 2014  |  1014 views  |  0  |  Recommends 0

In this era of virtualisation, cloud computing and smart mobile devices, the IT infrastructure landscape looks significantly different to a decade or even five years ago. Yet in many organisations, se...

TagsSecurityRisk & regulation
Pat CarrollValidSoft - London

Payment Card Data Theft At The POS - Time To Knuckle Down

13 October 2014  |  2871 views  |  1  |  Recommends 0

Recently, I wrote a piece highlighting some of the startling data released on the true costs of fraud published in a report by Lexis Nexis. This report examined the costs of fraud across a number of ...

TagsSecurityPaymentsGroupInnovation in Financial Services
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,306
Active bloggers
24,630
Members
8,174
Posts
11,364
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Pat Carroll

Throughout his career, Pat has been at t...

Reuven Harrison

Reuven Harrison is CTO and Co-Founder of...

Who is commenting on Security posts

Pat Carroll
Melvin Haskins
Ketharaman Swaminathan
Otmane EL RHAZI
Ilja Ilit
Chris Torr