Similar Articles |
|
Insurance & Technology November 12, 2007 Conz & Rodier |
Predictive Analytics and Complex Event Processing Technology Move to Cutting Edge of Financial Services Industry As data volumes continue to rise, bankers, insurers and traders are leveraging predictive models to anticipate future behavior and events. |
Bank Systems & Technology February 10, 2010 Penny Crosman |
ID Fraud Grew 12% in 2009, But Wells Fargo's Fraud Losses Are Down Javelin Research's latest fraud survey finds identity fraud continues to rise, but losses are down at some banks due to fraud detection technology improvements. |
Insurance & Technology August 12, 2005 Wendy Toth |
Best Line Of Defense While insurance companies must secure their systems against ever-more-sophisticated attacks, they also must provide safe access to these systems for customers and business partners. |
Bank Systems & Technology June 26, 2006 Deena M. Amato-McCoy |
Closing the Door on Criminals Banks need a consistent approach to fraud assessment and prevention, otherwise they will never truly get ahead of the problem. |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
Bank Technology News August 2009 Craig Priess |
On the Backs Of Mules: An ACH Fraud Scheme Banks of all sizes should consider additional fraud prevention strategies to counter today's evolving threats. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
BusinessWeek July 3, 2006 Dean Foust |
ID Theft: More Hype Than Harm Law enforcement officials say the criminals tend not to follow through after stealing personal data. |
Bank Technology News September 2006 |
Homeland Insecurity One of the toughest battles for bankers may be in combating online security breaches and sophisticated money laundering schemes. |
CRM May 2015 Leonard Klie |
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. |
CIO April 15, 2006 Galen Gruman |
"CSI" for the Enterprise? Electronic data discovery tools help investigate fraud, breaches and other bad behavior. But CIOs should approach them with caution. |
Bank Systems & Technology December 21, 2009 Nathan Conz |
Fraud: Social Media Heightens New Threats As fraudsters increasingly seek to exploit weaknesses in consumers' defenses through social engineering schemes rather than hack vulnerabilities in banks' security systems, the need for enterprisewide solutions to detect fraud across channels is greater than ever. |
Bank Systems & Technology December 1, 2005 Eileen Colkin Cuneo |
Dealing With Data Theft After the Fact When a security breech occurs, a company handling it right can flip the negative into a positive and earn customers' respect and appreciation. If they handle it wrong, and the business will fight the stigma of being an untrustworthy organization indefinitely. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
Bank Systems & Technology July 23, 2010 Penny Crosman |
KeyCorp Building Analytic Tools to Prevent Fraud The company is starting a two-year project to create analytics that will find and address fraud in real time, before transactions are completed. |
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. |
Bank Technology News September 2010 Robin Arnfield |
Community Banks Tackle Anti-Fraud Tech Digital Resolve's Analysis Engine offers regional and community banks alerts about suspicious transactions every 10 minutes. |
U.S. Banker December 2009 Glen Fest |
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
Bank Technology News November 2009 Rebecca Sausner |
AML and Fraud Get Together Experts discuss trends in fraud and AML reporting, technology and regulation. |
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. |
Bank Technology News February 2011 John Adams |
WikiLeaks Wakes Up Fraud Innovation There's good reason for the banking industry to be alarmed: Prevailing AML protections designed to flag suspicious transactions won't sniff out "WikiLeaks-style" actions, which skirt most tech guards through via hard-to-detect internal access. |
Bank Technology News October 2009 Michael Sisk |
Wire Fraud's Growing Threat Just how big a problem wire fraud has become is a matter of some debate -- confusion fueled in part by banks' and businesses' reluctance to speak openly about it. |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
Investment Advisor June 2008 Irace & Mehta |
Security in a New Age How to protect your firm from 21st century online criminals |
Bank Technology News September 2010 Tom Leuchtner |
Patrolling the Neighborhood Cyber criminals are employing increasingly sophisticated methods to perpetrate financial crimes. |
Wall Street & Technology November 26, 2007 Melanie Rodier |
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. |
Bank Systems & Technology August 27, 2009 Maria Bruno-Britz |
Evolving Fraud Schemes Keep Pressure on Evolving Payments Instruments While some of the latest schemes borrow from scams past, today's fraud schemes are as sophisticated as banks' most advanced payments systems. And stopping them is still a challenge. |
Bank Technology News November 2008 Maria Trombly |
Mobile Insecurity: Reality or Just hype? The increasing functionality and numbers of mobile banking platforms creates the potential for mobile banking security issues, but industry watchers have widely divergent opinions about how serious the threat really is. |
Bank Technology News September 2008 Anthony Malakian |
Budgets Inch Up The top priorities for bank security spending are fraud detection for money transfers and an AML system, followed by fraud detection for online banking. |
New Architect May 2002 Jesus Mena |
Active Fraud Prevention Using data mining to combat online theft... |
InternetNews June 22, 2005 Tim Gray |
Fronting a Fix on Data Breaches Everyone's pointing fingers and looking for answers as the investigation into a recent leak of credit card accounts at CardSystems Solutions unfolds. |
Wall Street & Technology March 21, 2006 Paul Allen |
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. |
Bank Systems & Technology May 5, 2007 Maria Bruno-Britz |
Fraud Techniques Evolve in Parallel with Bank Products and Defenses As fraudsters' techniques evolve alongside the products and services offered by financial institutions, new steps must be introduced to stop them. |
PC World December 2004 Bob Tedeschi |
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. |
Bank Systems & Technology April 7, 2006 Peggy Bresnick Kendler |
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
Bank Systems & Technology August 2, 2005 Phil Britt |
Fighting the New Face of Fraud Technology plays a critical role in banking fraud, both in creating new opportunities for fraud and offering new methods to defend against it. Financial services institutions must take a holistic approach to combating fraud. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
U.S. Banker September 2004 Karen Krebsbach |
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. |
Financial Advisor November 2005 Joel Bruckenstein |
Securing Yourself And Clients Identity theft poses a serious threat for financial advisors and their clients. Here are steps to take to prevent identity theft and related security concerns. |
Bank Technology News December 2009 Rebecca Sausner |
Out-of-Band Authentication Gets Outfoxed Banks in the United Kingdom are battling fraudsters that have found a way to compromise out-of-band authentication-an approach supported by many fraud experts. |
CIO March 15, 2002 Sarah D. Scalet |
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... |
Bank Technology News April 2010 Michael Sisk |
Fifth Third Banks Charts New Security Course Man-in-the-middle attacks and other assaults on the browser are becoming more common and pose a challenge to the whole banking industry. Fifth Third is taking new security measures. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Searcher November 2005 Carol Ebbinghouse |
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. |
U.S. Banker March 2003 Melissa Solomon |
Is California Asking for Too Much Information? A new law is aimed at protecting customers from identity theft. The disclosures finance companies make could be embarrassing. Not telling could hurt even more. |
Wall Street & Technology July 28, 2004 Jim Middlemiss |
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. |