Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

50 Million Dollar Van Gogh Stolen No Alarm System

“A prized Vincent van Gogh still life was stolen from a Cairo museum leading to a massive art hunt, conflicting reports about the details of the crime, and plenty of finger-pointing. Five people, me...

05 Oct 2010
Elizabeth Lumley

Does operational Utopia exist?

The dialogue between the needs of the business groups (often widely disparate and silo'ed business groups) and the responsibilities of the enterprise IT departments can often read like a clichéd marri...

05 Oct 2010
A Finextra Member

When data loss gets personal

Ask yourself a question: do you know where your personal information is held and do you know how secure it is? When you deposit your savings into a bank account or leave your house keys with a trusted...

05 Oct 2010
Online Banking
Uri Rivner

Operation Trident

The bloodhounds are continuing to register notable victories over online crime rings. This time there were a massive series of arrests done in US, UK and other countries in relation to fraudsters spr...

04 Oct 2010
Innovation in Financial Services
A Finextra Member

Nefarious trojans call for two-pronged strategy

Zeus is bad and future versions of malware could be much worse; when will we move beyond the exclusive strategy of trying to detect or block nefarious software? So many security specialists continue t...

04 Oct 2010
A Finextra Member

Asia Fragments or does it?

I participated in a series of Fragmentation Forums in Asia last week. Just like previous events in Tokyo the events in Hong Kong and Singapore were very well attended showing that interest in fragment...

04 Oct 2010
Brett King

I've got followers: rewarding social media influence

Ashton Kutcher was famous for being the first celebrity to exceed 1 million followers on Twitter (now 5.8m), the famous Zuck has over 850,000 friends on his Facebook fan page, but this is not your ave...

04 Oct 2010
Finance 2.0
Robert Siciliano

Log Out, Log Out, I repeat, LOG OUT

One of the most common yet underreported causes of data breaches is users’ failure to properly log out of public PCs. Is your work computer accessible to others, perhaps after business hours? How abou...

02 Oct 2010
Chandrashekar Gopalarao

Complaints and technology

The recent news about the flood of complaints received by top banks in the UK has understandably evoked serious concern. FSA has called upon the banks to overhaul their complaints handling mechanism. ...

02 Oct 2010
A Finextra Member

Cairo conference focuses on Data Field Encryption

If Visa’s Payment Security Forum held in Cairo this week is anything to go by, Data Field Encryption projects certainly seem to be on the agenda for banks in the Middle East, Africa, and Eastern Euro...

30 Sep 2010
Information Security
A Finextra Member

What financial services can learn from manufacturing: part 1

Throughout its life, the manufacturing industry has gone through many changes that have each revolutionized the way products are made. Consider the principle of using uniform and interchangeable parts...

30 Sep 2010
A Finextra Member

Sibos

Arrive on the Sunday straight to the Hotel and then on to the Arena, photo taken, badge issued, now where is the stand. Into the Hall and the same question comes to mind “how the hell are they going t...

30 Sep 2010

Now hiring