Join the Community

23,520
Expert opinions
41,375
Total members
351
New members (last 30 days)
187
New opinions (last 30 days)
29,142
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Paul Irvine

Paul Irvine Director, Major Accounts UK&I at Fortinet

The evolution of network security strategies being adopted by the financial services sector.

The rise in popularity of the Internet of Things (IoT) and a consumer desire to access valuable data on various devices has led to network security becoming increasingly complicated for financial services providers. As financial institutions transition their network security strategies to meet these consumer demands and grant greater individual acc...

/security

Retired Member

Retired Member 

Phone Scams For Everyone

In the past day or two I’ve received a few alarming voicemails claiming potential legal actions and even threatening that the police will come to arrest me. Some claimed to be from the IRS, others were more vague. Anyone’s initial reaction is great concern – no one wants to be subject of a mysterious debt collection, a criminal investigation, or p...

/security

Paul Irvine

Paul Irvine Director, Major Accounts UK&I at Fortinet

Why remote working presents an increased threat to financial services

Security teams and IT departments at large enterprises across all industries are faced with securing against an ever expanding attack surface daily. Previously, vulnerable points of entry used to live within the organisation’s walls, where firewalls and inline security tools could protect them. But as networks have evolved to accommodate the const...

/security

Paul Irvine

Paul Irvine Director, Major Accounts UK&I at Fortinet

4 Cybersecurity Crunch Points Facing the Financial Services Sector

It’s well known that the main trends currently driving change within the technology sector are the cloud, internet of things, mobility and big data analytics. While advances in digital business are simplifying and enhancing life for the consumers of financial services, organisations are faced with the challenge of these trends’ impact on the makeu...

/security

Retired Member

Retired Member 

Does the Buck Stop with GameStop?

In March, I wrote about the attack on the infrastructure of United States of America. It wasn’t an attack on our naval bases, bridges, or water supply. It was an attack on the infrastructure of our internet, rendering websites, including Twitter and Netflix, catatonic. It was an attack with malware, allowing hackers to target websites with high tr...

/security

Paul Irvine

Paul Irvine Director, Major Accounts UK&I at Fortinet

Consolidation and integration of security solutions in Financial Services

The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-person transactions to the fully digital business model it is today, network infrastructure has had to evolve as well – which has led to it becoming incre...

/security

Retired Member

Retired Member 

Computer Security - Bankers Cannot Ignore It But It Will Never Be Completely Safe

In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never considered myself a computer security expert then, and certainly not now. But the bank chose me as a guy who knew banking IT from A to Z, and could develo...

/security

Retired Member

Retired Member 

Attack of the Bots

While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of automated bots to commit fraud has risen to the top of the list. Botnets are a type of malware that allows an attacker to take control of an affected c...

/security

Retired Member

Retired Member 

The real impact of the Vault 7 CIA data leak

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone could be monitoring what you say in your own house is alarming, but the real issue isn’t that the CIA spies on people. It’s not even that they do it thr...

/security /regulation

Retired Member

Retired Member 

Overcoming Vulnerabilities In TLS

Recently Sudo Security Group uncovered something shocking about a range of popular applications available for download in the Apple's iOS Store. While performing research for their security tool verify.ly, the team discovered 76 of them had the same security hole. Further, according to estimates from Apptopia, a provider of mobile app data and ins...

/security

Now Hiring