Instigate change. Start a new collaborative Blog Group

Create group
James Stickland

Enterprise Cybersecurity Is Like Building Castle Walls, But Everyone Has A Key

Your company’s systems and network are like a medieval fortress. You’ve built your stone walls, lined them with archers and prepared your pikemen for the threat of an invading force, only to discover ...

07 Apr 2017
Mike Lynch

Malware: The Hidden Threat to Your Mobile Device

Many mobile device users are aware of basic fraud prevention steps like not clicking on suspicious links or downloading unknown apps. But what if the malware threats of the future come preinstalled on...

31 Mar 2017
Online Banking
Retired Member

Cashless Society: A Dystopian Future?

Following on from the UK’s decision to introduce new coins, there has been a lot of debate around the value of the expensive change over. So much so, that many have looked at whether we would have bee...

31 Mar 2017
Trends in Financial Services
Vipin Kumar Sharma

Inefficient IT Systems - Challenges for Operation Risk Management

Recently one news article caught my attention and reminded me of an exceptional experience of my trading days. A German bank accidentally transferred more than 5 billion euros to four other banks du

30 Mar 2017
Operational Risk Management
Paul Irvine

Consolidation and integration of security solutions in Financial Services

The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-perso...

29 Mar 2017
Information Security
Retired Member

Cloud: Elixir for Digital Transformation Elasticity, cyber defence and data compliance standard

Cloud technology is the salvation of the financial services industry. The cloud’ elasticity brings a new level of efficiency by matching volume to capacity. The cloud gives enterprise protection again...

27 Mar 2017
Innovation in Financial Services
M. Arthur Gillis

Computer Security - Bankers Cannot Ignore It But It Will Never Be Completely Safe

In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never consid...

24 Mar 2017
Information Security
Mike Lynch

Attack of the Bots

While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of au...

23 Mar 2017
Information Security
Tom Hay

PSD2 - The Final RTS: 10 Things You Need To Know

The wait is over. The European Banking Authority (EBA) has recently published its ‘final’ Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and common and secure communicat...

10 Mar 2017
Retired Member

Seven cyber security predictions for 2017

The face of cyber security is changing constantly, and 2017 will be no exception. Here are seven cyber predictions and trends that we’ve seen emerging in 2017 and will gain in importance as the year p...

09 Mar 2017
Retired Member

The real impact of the Vault 7 CIA data leak

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone cou...

09 Mar 2017
Information Security
Retired Member

Challenges Of Offshore Programmers In Offshore Development

Today there are various choices for US Companies to perform offshore programming development known as Offshoring or Outsourcing. A portion of the nations that represent considerable authority in offsh...

06 Mar 2017
Business Knowledge for IT