24 January 2017


John SafaPushfor Ltd - London

Email isn’t fit for purpose for sending confidential information

20 January 2017  |  3119 views  |  0 comments | recommendations Recommends 1

Banks are struggling with email. It’s no longer an immediate form of communication, for most of us it’s a massive headache, and most importantly it’s risky. It’s too easy to send something from the wrong email address, or to the wrong person. Content can be leaked, or end up in the public domain. (Just ask Hilary Clinton, Michael Gove, or the Krem...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Fake News is Becoming Too Real

17 January 2017  |  2821 views  |  0 comments | recommendations Recommends 0

Fake news is a problem that is taking the internet by storm, and it ran rampant during the 2016 Presidential Election. In fact, many believe that fake news stories had a strong impact on the outcome of the election. In a survey following the election by the Pew Research Center, a whopping 64 percent of polled Americans said that fake news has give...

More blog posts
Abe Smith
Abe SmithDealflo - London

How can financial agreements be truly enforceable?

17 January 2017  |  3139 views  |  0 comments | recommendations Recommends 0

As we know from the PPI scandal, financial agreements can be far from air tight when it comes to being legally enforceable. Even when PPI was correctly contracted, many banks were unable to prove that...

Jason Mace
Jason MaceGala Technology - Rotherham

2016: The year of Fraud

15 December 2016  |  6606 views  |  0 comments | recommendations Recommends 0

When historians look back on 2016 I suspect it will be viewed as something of a watershed year. It will be remembered for the year of Brexit, the year of Trump, and for growing numbers of business own...

Vishal Bhatnagar
Vishal BhatnagarCast Software Ltd - London

External vs Internal Threats - Which is the Greater Risk?

14 December 2016  |  5362 views  |  0 comments | recommendations Recommends 0

Organisations today face more complex software risk than ever before. With an increasing number of breach and ransomware stories making front page news, the need for robust corporate defence has neve...

TagsSecurityRisk & regulation
Sarah Clark
Sarah ClarkMitek - San Diego

Identity verification in an era of data breaches

08 December 2016  |  7060 views  |  0 comments | recommendations Recommends 1

Cyberattacks and breaches have grown in frequency, and losses are on the rise. In 2015 the number of U.S. data breaches continued to break records with 781 reported where the number of records exposed...

TagsSecurityRisk & regulationGroupInnovation in Financial Services
Rhodri James
Rhodri JamesProvenir - London

5 Steps to Prepare for the New 'Beneficial Ownership’ KYC Rules

06 December 2016  |  5597 views  |  0 comments | recommendations Recommends 0

Additional stringent know your customer (KYC) regulation comes into effect in the US in spring 2018. The new rules concern ‘beneficial ownership’ – institutions will have to discover ‘ownership’ – def...

TagsSecurityRisk & regulation
Daniel Giannotti
Daniel GiannottiCapco - London

Superior services in wealth management begin with security

28 November 2016  |  5929 views  |  0 comments | recommendations Recommends 0

Premium banking has always been about seamless service and pre-eminent asset performance. But now there’s a new factor in the premium equation: the challenge of assuring client trust in a digital age....

TagsSecurityMobile & online
Hannah Preston
Hannah PrestonCA - London

Smartphones, Strong Authentication and Cardholder Expectation

22 November 2016  |  5382 views  |  0 comments | recommendations Recommends 0

Brave New World Would you believe, we still rely on fifteen-year-old technology for today's internet payment security? So much has changed in that time, the exciting news is we’re about to make a big...

Ajay Vij
Ajay VijInfosys - London

Securing future banks

11 November 2016  |  5762 views  |  0 comments | recommendations Recommends 0

Last week, even as the shadow of Wikileaks loomed large over the third US presidential debate, another event of epic proportions happened in the cyber-world. Large scale DDoS (Distributed Denial of Se...

Previous 1 | 2 | 3 | 4 | 5 |Next
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Abe Smith
Abe Smith

I am the founder and CEO of Dealflo, a c...

John Safa
John Safa

John Safa is a tech entrepreneur, securi...

Robert Siciliano
Robert Siciliano

Security analyst, published author, tele...

Who is commenting on Security posts