22 August 2017

Information Security

A Finextra Community Group

131Posts 654,274Views 203Comments

Latest blog posts

Paul IrvineFortinet - London

Financial services: Reduce the cyber risk from within

17 August 2017  |  5011 views  |  0 comments | recommendations Recommends 0

Financial services organisations are at an inherently greater risk of cyber attacks due to the sensitive nature of the data they store, and the monetary motivations of cybercriminals, they are keenly aware of the damage that can result from being a victim of a data breach. In 2016, the financial services sector was the most frequently targeted ind...

TagsSecurity
Paul IrvineFortinet - London

The evolution of network security strategies being adopted by the financial services sector.

15 August 2017  |  5105 views  |  0 comments | recommendations Recommends 2

The rise in popularity of the Internet of Things (IoT) and a consumer desire to access valuable data on various devices has led to network security becoming increasingly complicated for financial services providers. As financial institutions transition their network security strategies to meet these consumer demands and grant greater individual acc...

TagsSecurity
More blog posts
Ben Knieff
Ben KnieffOutside Look - New York

Phone Scams For Everyone

11 July 2017  |  4884 views  |  0 comments | recommendations Recommends 0

In the past day or two I’ve received a few alarming voicemails claiming potential legal actions and even threatening that the police will come to arrest me. Some claimed to be from the IRS, others wer...

TagsSecurity
Paul Irvine
Paul IrvineFortinet - London

Why remote working presents an increased threat to financial services

16 June 2017  |  8161 views  |  0 comments | recommendations Recommends 0

Security teams and IT departments at large enterprises across all industries are faced with securing against an ever expanding attack surface daily. Previously, vulnerable points of entry used to live...

TagsSecurity
Paul Irvine
Paul IrvineFortinet - London

4 Cybersecurity Crunch Points Facing the Financial Services Sector

28 April 2017  |  11050 views  |  0 comments | recommendations Recommends 0

It’s well known that the main trends currently driving change within the technology sector are the cloud, internet of things, mobility and big data analytics. While advances in digital business are si...

TagsSecurity
Retired Member
a non-active Finextra member

Does the Buck Stop with GameStop?

19 April 2017  |  1231 views  |  0 comments | recommendations Recommends 0

In March, I wrote about the attack on the infrastructure of United States of America. It wasn’t an attack on our naval bases, bridges, or water supply. It was an attack on the infrastructure of our in...

TagsSecurity
Paul Irvine
Paul IrvineFortinet - London

Consolidation and integration of security solutions in Financial Services

29 March 2017  |  3021 views  |  0 comments | recommendations Recommends 0

The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-perso...

TagsSecurity
M. Arthur Gillis
M. Arthur GillisComputer Based Solutions, Inc. - Atlanta

Computer Security - Bankers Cannot Ignore It But It Will Never Be Completely Safe

24 March 2017  |  3180 views  |  0 comments | recommendations Recommends 0

In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never consid...

TagsSecurity
Mike Lynch
Mike LynchInAuth - Boston

Attack of the Bots

23 March 2017  |  6051 views  |  1 comments | recommendations Recommends 0

While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of au...

TagsSecurity
John Safa
John SafaPushfor Ltd - Wimbledon

The real impact of the Vault 7 CIA data leak

09 March 2017  |  6360 views  |  0 comments | recommendations Recommends 0

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone cou...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 |Next

About this group join  Join us

Founded by An ex-member
Date 04 Apr 2007
Group profile
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
members
29,483
Members
comments
17,537
Comments
blogs
11,507
Posts
bloggers 
1,135
Active bloggers

Top bloggers: 30 days

Most viewed Engaging

Who is commenting on Information Security posts

Jess Hayes
Ketharaman Swaminathan
Brett King
Dean Procter
Alexander Peschkoff