26 May 2017

Information Security

A Finextra Community Group

127Posts 617,887Views 203Comments

Latest blog posts

Paul IrvineFortinet - London

4 Cybersecurity Crunch Points Facing the Financial Services Sector

28 April 2017  |  8058 views  |  0 comments | recommendations Recommends 0

It’s well known that the main trends currently driving change within the technology sector are the cloud, internet of things, mobility and big data analytics. While advances in digital business are simplifying and enhancing life for the consumers of financial services, organisations are faced with the challenge of these trends’ impact on the makeu...

TagsSecurity
a non-active Finextra member

Does the Buck Stop with GameStop?

19 April 2017  |  652 views  |  0 comments | recommendations Recommends 0

In March, I wrote about the attack on the infrastructure of United States of America. It wasn’t an attack on our naval bases, bridges, or water supply. It was an attack on the infrastructure of our internet, rendering websites, including Twitter and Netflix, catatonic. It was an attack with malware, allowing hackers to target websites with high tr...

TagsSecurity
More blog posts
Paul Irvine
Paul IrvineFortinet - London

Consolidation and integration of security solutions in Financial Services

29 March 2017  |  2670 views  |  0 comments | recommendations Recommends 0

The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-perso...

TagsSecurity
M. Arthur Gillis
M. Arthur GillisComputer Based Solutions, Inc. - Atlanta

Computer Security - Bankers Cannot Ignore It But It Will Never Be Completely Safe

24 March 2017  |  2893 views  |  0 comments | recommendations Recommends 0

In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never consid...

TagsSecurity
Mike Lynch
Mike LynchInAuth - Boston

Attack of the Bots

23 March 2017  |  5611 views  |  1 comments | recommendations Recommends 0

While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of au...

TagsSecurity
John Safa
John SafaPushfor Ltd - Wimbledon

The real impact of the Vault 7 CIA data leak

09 March 2017  |  5984 views  |  0 comments | recommendations Recommends 0

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone cou...

TagsSecurityRisk & regulation
Mike Lynch
Mike LynchInAuth - Boston

Overcoming Vulnerabilities In TLS

28 February 2017  |  4139 views  |  0 comments | recommendations Recommends 0

Recently Sudo Security Group uncovered something shocking about a range of popular applications available for download in the Apple's iOS Store. While performing research for their security tool verif...

TagsSecurityMobile & online
Pat Carroll
Pat CarrollValidSoft - London

Security by Obscurity is the key!

27 January 2015  |  3657 views  |  0 comments | recommendations Recommends 0

2014 shocked us all into the reality that no institution or organization, no matter how big or sophisticated, was immune to being “hacked” or “breached”. Towards the end of the year, we were all numbe...

TagsSecurityTransaction banking
Pat Carroll
Pat CarrollValidSoft - London

iHack Hastens Call for Multi-factor Authentication

05 September 2014  |  3626 views  |  1 comments | recommendations Recommends 0

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’...

TagsSecurityPayments
Pat Carroll
Pat CarrollValidSoft - London

Our Predictions for 2014: Who Will Dominate? Part 1

20 January 2014  |  2334 views  |  0 comments | recommendations Recommends 0

Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they wo...

TagsSecurityInnovation
Previous 1 | 2 | 3 | 4 | 5 |Next

About this group join  Join us

Founded by An ex-member
Date 04 Apr 2007
Group profile
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
members
29,228
Members
comments
17,199
Comments
blogs
11,266
Posts
bloggers 
1,164
Active bloggers

Top bloggers: 30 days

Most viewed Engaging

Who is commenting on Information Security posts

Jess Hayes
Ketharaman Swaminathan
Brett King
Dean Procter
Alexander Peschkoff