22 October 2017

Information Security

A Finextra Community Group

135Posts 696,826Views 203Comments

Latest blog posts

Archive for: June, 2008
a non-active Finextra member

Tech Giants to Save Us

24 June 2008  |  4465 views  |  2 comments | recommendations Recommends 0

I was wondering if I can have as many ID cards as I want - who is paying for them? Do I need a reader? Blah Blah Blah... Internet Mark2- the only 'marks' it gets are the fools dumb enough to buy in to this scam. Who woke up those sleeping giants anyway?

Elton Canewriter & tech geek - Brisbane

Blogging from the Sifma TMC floor

12 June 2008  |  2877 views  |  0 comments | recommendations Recommends 0

White-badged visitors wander the rabbit warren of interconnected halls linked by escalators and corridors. From their designated areas, eagle-eyed sales people call out people’s names from their name badges as they walk past, fishing for leads. Casually dressed technologists (and probably the odd student) stop at each stand harvesting trade show ta...

TagsRisk & regulation
More blog posts
Retired Member
a non-active Finextra member

Breach Laws fail to stem losses and RSA encrypto-stortion

10 June 2008  |  2731 views  |  0 comments | recommendations Recommends 0

A study by Carnegie Melon University has found that legislation mandating reporting of data breaches (and fines) has failed to lower ID theft or it's effects. Is it that nothing has changed and the do...

Retired Member
a non-active Finextra member

Risks in the global payments and settlement systems.

04 June 2008  |  4040 views  |  0 comments | recommendations Recommends 0

There are some lovely little new systems which have well and truly taken that into account. In fact it has to be the foundation of any architecture. Robust, proven '5 nines' technology and equipment a...

TagsRisk & regulation
Previous 1 Next

About this group join  Join us

Founded by An ex-member
Date 04 Apr 2007
Group profile
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
Active bloggers

Top bloggers: 30 days

Most viewed Engaging

Who is commenting on Information Security posts