Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Your company’s systems and network are like a medieval fortress. You’ve built your stone walls, lined them with archers and prepared your pikemen for the threat of an invading force, only to discover ...
Many mobile device users are aware of basic fraud prevention steps like not clicking on suspicious links or downloading unknown apps. But what if the malware threats of the future come preinstalled on...
Following on from the UK’s decision to introduce new coins, there has been a lot of debate around the value of the expensive change over. So much so, that many have looked at whether we would have bee...
Recently one news article caught my attention and reminded me of an exceptional experience of my trading days. A German bank accidentally transferred more than 5 billion euros to four other banks du
The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-perso...
Cloud technology is the salvation of the financial services industry. The cloud’ elasticity brings a new level of efficiency by matching volume to capacity. The cloud gives enterprise protection again...
In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never consid...
While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of au...
The wait is over. The European Banking Authority (EBA) has recently published its ‘final’ Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and common and secure communicat...
The face of cyber security is changing constantly, and 2017 will be no exception. Here are seven cyber predictions and trends that we’ve seen emerging in 2017 and will gain in importance as the year p...
The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone cou...
Today there are various choices for US Companies to perform offshore programming development known as Offshoring or Outsourcing. A portion of the nations that represent considerable authority in offsh...