Similar Articles |
|
Insurance & Technology August 10, 2006 Anthony O'Donnell |
The Road to Security Security is a journey - it is a constant and evolving discipline. |
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
Insurance & Technology November 5, 2008 Peggy Bresnick Kendler |
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. |
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. |
Insurance & Technology March 7, 2006 Peggy Bresnick Kendler |
Who Goes There? Insurance industry executives discuss how controlling access to information through identity management is key to securing critical client and corporate data. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
Bank Systems & Technology June 1, 2005 Deena M. Amato-McCoy |
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats. |
Wall Street & Technology August 27, 2004 |
Up Front Fraudsters Go Phishing... Things Are Looking Up... SOX on the Brain... |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
CIO September 15, 2005 Scott Berinato |
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Insurance & Technology November 1, 2006 Maria Woehr |
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. |
Insurance & Technology March 16, 2004 Peggy Bresnick-Kendle |
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. |
InternetNews March 3, 2005 Roy Mark |
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. |
Insurance & Technology June 14, 2005 Wendy Toth |
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. |
Registered Rep. August 15, 2014 Diana Britton |
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it. |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. |
CIO July 1, 2003 Alice Dragoon |
Eight (Not So) Simple Steps to the HIPAA Finish Line While much of the new security rule is common sense, meeting it by the 2005 deadline won't be easy. Here's a checklist to ease your heartburn. |
Financial Planning October 1, 2012 |
Less-Risky Business: Protecting your Financial Planning Firm from Fraud Deena Katz tells financial advisors 5 easy steps to protect your firm from fraud and software vulnerabilities |
Investment Advisor June 2008 Irace & Mehta |
Security in a New Age How to protect your firm from 21st century online criminals |
InternetNews December 7, 2005 Roy Mark |
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
T.H.E. Journal August 2005 Irene Sandler |
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. |
CIO September 24, 2009 Matt Karlyn et al. |
Identity Theft: 7 Tips for Complying with FTC Red Flag Rules The FTC's Red Flag Rules for reducing fraud due to identity theft take effect on November 1. Here's what you need to do to make sure you comply. |
Insurance & Technology May 16, 2007 Peggy Bresnick Kendler |
Effective Vendor Management Enables Insurance Companies to Get the Most Out of Software, IT Services and Outsourcing Contracts Questions and answers about insurer/vendor relationships. |
Insurance & Technology May 14, 2005 David Joachim |
Q&A With Allstate Security Boss Kim Van Nostern An interview about how, in today's environment, it takes more than technical expertise to run a secure insurance enterprise. |
Insurance & Technology August 12, 2005 Peggy Bresnick Kendler |
The Compliance Challenge Industry experts offer opinions on what the biggest challenges carriers currently face in terms of regulatory compliance. |
U.S. Banker July 2003 Michael Grebb |
If Bonnie and Clyde Only Knew... Bankers are working to shore up security efforts, particularly on-line breaches. But hacking a bank's network is too fun to forgo, making prevention that much harder. |
Bank Technology News June 2003 Michael Grebb |
Banks' Arsenal Grows Larger Fighting viruses, hackers and all things "e-vil" |
Bank Systems & Technology November 29, 2004 Cynthia Ramsaran |
Catch of the Day: Banks Face New Phishing Scams Newer and more intelligent phishing attacks target bank customers globally. |
InternetNews November 23, 2009 |
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. |
Insurance & Technology June 16, 2004 Julie Gallagher |
Look On the Bright Side Rather than letting the clouds of regulation rain on their operations, insurers that look for compliance's silver lining have an opportunity to improve their business processes. |
Pharmaceutical Executive December 1, 2013 Slota et al. |
Prescribed Behavior: Operating Under a Consent Decree For senior executives, meeting the requirements of a Consent Decree to the satisfaction of regulators is only half of the job. |
Wall Street & Technology January 24, 2006 Cory Levine |
A New View of Risk Only now are financial firms approaching the risk associated with their technology infrastructures as a business-critical initiative with substantial bottom-line implications and devoting greater resources to their maintenance. |
InternetNews April 10, 2008 Susan Kuchinskas |
Security Here and There Foreign compliance vendors say security trumps privacy in the U.S. |
Insurance & Technology January 5, 2007 Vincent Oliva |
Take Risk Management and Compliance to the Next Level A seemingly never-ending wave of new compliance directives is perplexing insurance companies around the world, sowing confusion among insurers about how they should respond. |
Insurance & Technology May 28, 2008 Nathan Conz |
Insurers Taking More Unified Approach to Compliance Compliance is becoming the key component of core systems -- especially within the insurance industry. It means complying with state-to-state insurance regulations; but it also means establishing an anti-money laundering program. |
Bank Director 2nd Quarter 2010 Jack Milligan |
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. |
Insurance & Technology February 19, 2004 Anthony O'Donnell |
Compliance as Opportunity Regulatory compliance demands force insurers to dedicate scarce resources, but meeting those demands can be the occasion to accomplish worthwhile IT goals. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
Bank Technology News April 2009 Rebecca Sausner |
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. |