30 July 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

Make Information Security a Priority

13 hours ago  |  257 views  |  0  |  Recommends 0

Just about everyone has private information that should be protected. Let’s begin with something you’ve surely heard of: antivirus protection. But this isn’t enough to guard your personal data. A free antivirus service may not even update automatically, and this is very important to keep up with rapidly evolving technology. Your protection is w...

TagsSecurity
Jeremy TaylorRule Financial - London

Process, Process, Process

25 July 2014  |  1035 views  |  0  |  Recommends 0

In the second instalment of our six part series looking at the transformation that is required in investment banking operations, today we look at how process automation will enable investment bank business staff to be far even more effective in future. With investment banking in need of radicalising its workforce operations, it must pay greater at...

TagsSecurityInnovation
More blog posts
Anand SundaresanWipro Consulting Services - London

Do you KYC well!

23 July 2014  |  943 views  |  0  |  Recommends 0

Not sure if the KYC being done by banks is mature enough to perform its true function using standard credit check agencies which have stood the test of time. Financial regulations have come out strong...

TagsSecurityPayments
Jerry MulleIntelligent Environments - London

Vocal banking - the future of voice biometrics

23 July 2014  |  1929 views  |  0  |  Recommends 0

Last month, Barclays spelled the eventual end to security questions, passwords and long frustrating phone calls by announcing its move to voice recognition technology. The retail bank explained that o...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

How to Prevent Summertime Scams

19 July 2014  |  742 views  |  0  |  Recommends 0

Summertime is here…and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or...

TagsSecurity
Neil CaldwellCyberSource - Reading

Going global: Optimise the customer experience

14 July 2014  |  1678 views  |  0  |  Recommends 0

Thanks to eCommerce, I’ve seen the world become a lot smaller. With eMarketer estimating that global B2C eCommerce sales will hit $1.5 trillion in 2014, there are very few places that haven't been imp...

TagsSecurityRetail banking
Uri RivnerBioCatch - Tel Aviv

Brazil vs. Germany: A Surprising Find

12 July 2014  |  2088 views  |  1  |  Recommends 0

For the people of Brazil, the semi-final match in the 2014 World Cup was a mesmerizing event. True, the opposition was as fierce as you can get – no one in his right mind wants to play against Germany...

TagsSecurityMobile & onlineGroupInnovation in Financial Services
Pat CarrollValidSoft - London

Securing Transactions Means More Than Just Authentication

10 July 2014  |  2143 views  |  0  |  Recommends 0

The payments world is all abuzz about the potential of biometrics to solve many of the serious payment security issues we now face. Not only does biometric authentication – be it voice, iris or even A...

TagsSecurityPaymentsGroupInnovation in Financial Services
Dan BarnesInformation Corporation - London

Trade in Services Agreement threatens bank data sovereignty

10 July 2014  |  1139 views  |  0  |  Recommends 0

A clash between globalised financial services and domestic governments is looming. Activity by the US authorities particularly – from spying on friendly foreign governments, to aggressively pursuing s...

TagsSecurityRisk & regulationGroupFuture Finance News Analysis
Robert SicilianoIDTheftSecurity.com - Boston

How to Prepare a Storage Device for Resale

02 July 2014  |  997 views  |  0  |  Recommends 0

If you want to sell a storage device, first back everything up on it with a flash drive, external drive or automated backup service. For Android or iOS, activate the Google Auto Backup service or Appl...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,448
Active bloggers
31,622
Members
7,857
Posts
10,744
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Uri Rivner

Internet. The perfect fraud frontier. Th...

Pat Carroll

Throughout his career, Pat has been at t...

Neil Caldwell

I joined CyberSource in 2011, and am res...

Who is commenting on Security posts

Ketharaman Swaminathan
Uri Rivner
Fred Pyziak
Matt Scott
Sian Bentley