Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

10 tips to Secure Passwords

Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remem...

20 Nov 2014
Robert Siciliano

Hackers and Banks win, Clients lose

Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack ...

12 Nov 2014
A Finextra Member

Making IT work in a merger and acquisition environment

In a single move, mergers and acquisitions can provide businesses with a tremendous tool for increasing growth, profitability and improving strategic capabilities. M&As are gathering speed and las...

11 Nov 2014
A Finextra Member

Is 'good-enough' security good enough for Mobile Banking?

CEB TowerGroup predicts mobile banking usage will reach 17 billion transactions in 2015. At the same time, customers are still worried about security, which is the number one fear among potential mo...

11 Nov 2014
Robert Siciliano

Security is Everyone’s responsibility

In the movies, the good guys always get the bad guys. In cyber reality, no such thing exists. A survey of 5,000 IT security professionals turns up the following: 63% doubt they can stop data breac...

08 Nov 2014
A Finextra Member

Working with your CIO to negotiate GRC - Part Two

In part one of this blog series, I explained that firms need to take a holistic three stage approach to ensure data is kept secure, and therefore comply with data protection regulation and avoid fines...

07 Nov 2014
Robert Siciliano

Expect all Free Mobile Apps to leak your Data

Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone nu...

04 Nov 2014
Robert Siciliano

Steps to Manage a secure online backup

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should...

29 Oct 2014
A Finextra Member

Can cyber criminals spark the next financial crisis?

Earlier this month Mark Boleat, head of policy for the City of London, gave a serious warning to the financial services industry as he prepared to address the Institute of International Finance in Was...

29 Oct 2014
Robert Siciliano

5 ways Criminals hack your PC

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WI...

25 Oct 2014
A Finextra Member

Should your organisation COPE with the COLD?

We’ve heard the acronym BYOD (Bring Your Own Device) for some time now, but less about ‘COPE’ – Corporate Owned, Personally Enabled devices; tablets, smartphones and laptops which are owned by the ent...

24 Oct 2014
A Finextra Member

Working with your CIO to negotiate GRC - Part One

The increase in corporate mobile device use, fuelled by better technology and trends like Bring Your Own Device (BYOD) and enterprise focussed apps, means there are many more ways in which a business ...

23 Oct 2014

Now hiring