Join the Community

23,504
Expert opinions
41,346
Total members
343
New members (last 30 days)
184
New opinions (last 30 days)
29,138
Total comments

Latest expert opinions

clear
clear

126 Results from 2013, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Is That Mobile Application Invading My Privacy?

Facebook now offers “Home.” Facebook says “With Home, everything on your phone gets friendlier. From the moment you turn it on, you see a steady stream of friends’ posts and photos. Upfront notifications and quick access to your essentials mean you’ll never miss a moment. And you can keep chatting with friends, even when you’re using other apps. C...

/security

Retired Member

Retired Member 

Network Outages Highlight Key Areas of Weakness

The proposed Regulation SCI (Systems Compliance and Integrity) from the SEC may require further strengthening, but principles such as mandatory testing of disaster recovery procedures would ensure that financial organisations recognise some of the key weaknesses in their system infrastructures. One of the examples of system failure cited by the ...

/security /regulation Banking Architecture

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Beware of Credit Card Micro Charges

Micro charges are charges ranging from 20 cents to $10 and either are fraudulent, legitimate or fall into the category of “grey charges,” which describe sneaky recurring or unwanted charges. These charges often go undetected because they are so small. Nine out of 10 credit card holders don’t scrutinize their statements carefully, allowing these sca...

/security

Retired Member

Retired Member 

Assuring Your PCI Compliance

A critical component of any business success is being able to accept payments for goods and services. At the same time, we are keenly aware of the risk associated with doing so. Whatever one trades, whatever the business, any and every credit or debit transaction processed will involve sensitive personal information. This data has to transmitted a...

/security /payments Payments strategies 2015-2020-2030

Reghunathan Sukumara Pillai

Reghunathan Sukumara Pillai Consultant at Infosys

Safe Deposit Lockers Are spruced up rules the answer

Both Public and Private Sector Banks have offered Safe Deposit Lockers (SDL) as a service since long, usually to privileged customers. The locker – useful for storing valuables like gold ornaments or important papers – can be operated by the customer as and when required using the keys provided by the bank. In addition to annual rent, banks could ...

/security

Jane Adams

Jane Adams Marketing at Currently looking for a job

Let's stop talking about identity

I spent the end of last week sitting in a conference room in Brussels listening to presentations about digital identity and online trust. Hearing some of the delegate questions, it struck me once again how difficult a topic this is for some people to discuss. Why? Possibly because of all the philosophical and sociological baggage that comes with t...

/security /payments

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

National Savings and Investments are rather too lethargic

National Savings & Investments : Once you've bought your Premium Bonds online then you are ’obliged’ to register with NS&I’s "Online and Phone Service", ostensibly for your “Security and Convenience”. Until they’ve processed your registration (which has to be done on paper), you can’t access your Account on-line. If you try you ge...

/security Whatever...

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How Hackers Use Our Information Against Us

We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us? Whether you realize it or not, you expose a lot of...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is a Drive-By Download

Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or accept any software, and the malicious code can download...

/security /regulation

Retired Member

Retired Member 

Financial Transparency -- A Notoriety Issue

Today’s organisations need to be transparent. They need to have quick access to their data so that they can prove in the event of an audit that they are abiding the regulations and mandates demanded of them and others in their global chain. But what is transparency exactly? Simply put, it’s the ability to prove what actions you’re taking; show wh...

/security /regulation

Now Hiring