Instigate change. Start a new collaborative Blog Group

Create group
Blogs
A Finextra Member

Understanding market abuse in the age of market surveillance 2.0 - Part 3

Spotting how offenders conceal information and other tell-tale signs Beware of accepting everything at face value. And don’t be afraid to look under the rug for something that’s been hidden! In this...

22 Sep 2016
A Finextra Member

Understanding market abuse in the age of market surveillance 2.0 - Part 2

The deliberate – and fraudulent – influencing of market information Don’t take everything on trust. If something doesn’t look right, challenge it In this three-part blog series, we look at how marke...

21 Sep 2016
A Finextra Member

Understanding market abuse in the age of market surveillance 2.0

Part 1: Definition of market abuse and the techniques used for gaining market information A solid reputation for market surveillance may not be the most compelling argument for winning over customers...

20 Sep 2016
Jim Steven

Three things smaller, evolving companies should consider in the event of a data breach

With government figures showing that 9 out of 10 organisations suffered some form of a data breach last year, it's a near certainty that it will happen, no matter what the size of the organisation. Th...

14 Sep 2016
Nigel Farmer

CFTC Rules: Preventing the Rise of the Cybermen

The Commodities Futures Trading Commission (CFTC) recently finalized a set of cyber security rules, designed to help safeguard its systems from breaches; but worries about hacking and possible terrori...

14 Sep 2016
A Finextra Member

Financial Services: The Cybercrime Playground

Cybercrime is having a good year. It's been steadily rising up through the ranks, and according to PwC is one of the most commonly reported crimes in the financial services sector. It comes in many fo...

05 Sep 2016
Samee Zafar

Can Blockchain Prevent Cybercrime?

Can blockchain or distributed ledger technologies help prevent attacks on the world’s critical financial systems? Banks use standardised electronic messages, made up of codes and identifiers, a sort o...

31 Aug 2016
A Finextra Member

Protecting Data with DLP

The recent Brexit vote in the UK changes nothing from a GDPR perspective for those who wish to do business with EU entities. In today’s always-connected world, where almost all information is store

23 Aug 2016
A Finextra Member

It’s all about the looks: customers want more mobile and they want it biometric-secure

We’re constantly on the move, looking to stretch our time as much as we can so we can get more things done quicker. Undoubtedly, smartphones and tablets have turned into our best allies and enabled us...

19 Aug 2016
Innovation in Financial Services
Nanda Kumar

Security - worth paying for in a digital world?

When performing their daily banking routines, customers don’t want to be bothered by complex security features and authentication procedures. Today, they expect simple and fast user interfaces and oft...

12 Aug 2016
Jim Steven

10 critical steps to take in the first 24 hours of a data breach

The number of high profile data breaches that have hit the media headlines in recent years is certainly a wake-up call to organisations to be more prepared if it happens to them. But it's not just the...

11 Aug 2016
A Finextra Member

Cybercrime is flourishing: Time for action

It is very clear from the figures released by the various fraud prevention agencies that there is a dramatic increase in cybercrime and real-time fraud. Should the losses continue to persist at the cu...

10 Aug 2016

Now hiring