MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Insurance & Technology
November 12, 2007
Conz & Rodier
Predictive Analytics and Complex Event Processing Technology Move to Cutting Edge of Financial Services Industry As data volumes continue to rise, bankers, insurers and traders are leveraging predictive models to anticipate future behavior and events. mark for My Articles similar articles
Bank Systems & Technology
February 10, 2010
Penny Crosman
ID Fraud Grew 12% in 2009, But Wells Fargo's Fraud Losses Are Down Javelin Research's latest fraud survey finds identity fraud continues to rise, but losses are down at some banks due to fraud detection technology improvements. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Wendy Toth
Best Line Of Defense While insurance companies must secure their systems against ever-more-sophisticated attacks, they also must provide safe access to these systems for customers and business partners. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2006
Deena M. Amato-McCoy
Closing the Door on Criminals Banks need a consistent approach to fraud assessment and prevention, otherwise they will never truly get ahead of the problem. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
Bank Technology News
August 2009
Craig Priess
On the Backs Of Mules: An ACH Fraud Scheme Banks of all sizes should consider additional fraud prevention strategies to counter today's evolving threats. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
BusinessWeek
July 3, 2006
Dean Foust
ID Theft: More Hype Than Harm Law enforcement officials say the criminals tend not to follow through after stealing personal data. mark for My Articles similar articles
Bank Technology News
September 2006
Homeland Insecurity One of the toughest battles for bankers may be in combating online security breaches and sophisticated money laundering schemes. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
CIO
April 15, 2006
Galen Gruman
"CSI" for the Enterprise? Electronic data discovery tools help investigate fraud, breaches and other bad behavior. But CIOs should approach them with caution. mark for My Articles similar articles
Bank Systems & Technology
December 21, 2009
Nathan Conz
Fraud: Social Media Heightens New Threats As fraudsters increasingly seek to exploit weaknesses in consumers' defenses through social engineering schemes rather than hack vulnerabilities in banks' security systems, the need for enterprisewide solutions to detect fraud across channels is greater than ever. mark for My Articles similar articles
Bank Systems & Technology
December 1, 2005
Eileen Colkin Cuneo
Dealing With Data Theft After the Fact When a security breech occurs, a company handling it right can flip the negative into a positive and earn customers' respect and appreciation. If they handle it wrong, and the business will fight the stigma of being an untrustworthy organization indefinitely. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
Bank Systems & Technology
July 23, 2010
Penny Crosman
KeyCorp Building Analytic Tools to Prevent Fraud The company is starting a two-year project to create analytics that will find and address fraud in real time, before transactions are completed. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
Wall Street & Technology
September 17, 2007
Melanie Rodier
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. mark for My Articles similar articles
Bank Technology News
September 2010
Robin Arnfield
Community Banks Tackle Anti-Fraud Tech Digital Resolve's Analysis Engine offers regional and community banks alerts about suspicious transactions every 10 minutes. mark for My Articles similar articles
U.S. Banker
December 2009
Glen Fest
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
AML and Fraud Get Together Experts discuss trends in fraud and AML reporting, technology and regulation. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
Bank Technology News
February 2011
John Adams
WikiLeaks Wakes Up Fraud Innovation There's good reason for the banking industry to be alarmed: Prevailing AML protections designed to flag suspicious transactions won't sniff out "WikiLeaks-style" actions, which skirt most tech guards through via hard-to-detect internal access. mark for My Articles similar articles
Bank Technology News
October 2009
Michael Sisk
Wire Fraud's Growing Threat Just how big a problem wire fraud has become is a matter of some debate -- confusion fueled in part by banks' and businesses' reluctance to speak openly about it. mark for My Articles similar articles
CFO
August 1, 2002
Scott Leibs
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
Bank Technology News
September 2010
Tom Leuchtner
Patrolling the Neighborhood Cyber criminals are employing increasingly sophisticated methods to perpetrate financial crimes. mark for My Articles similar articles
Wall Street & Technology
November 26, 2007
Melanie Rodier
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. mark for My Articles similar articles
Bank Systems & Technology
August 27, 2009
Maria Bruno-Britz
Evolving Fraud Schemes Keep Pressure on Evolving Payments Instruments While some of the latest schemes borrow from scams past, today's fraud schemes are as sophisticated as banks' most advanced payments systems. And stopping them is still a challenge. mark for My Articles similar articles
Bank Technology News
November 2008
Maria Trombly
Mobile Insecurity: Reality or Just hype? The increasing functionality and numbers of mobile banking platforms creates the potential for mobile banking security issues, but industry watchers have widely divergent opinions about how serious the threat really is. mark for My Articles similar articles
Bank Technology News
September 2008
Anthony Malakian
Budgets Inch Up The top priorities for bank security spending are fraud detection for money transfers and an AML system, followed by fraud detection for online banking. mark for My Articles similar articles
New Architect
May 2002
Jesus Mena
Active Fraud Prevention Using data mining to combat online theft... mark for My Articles similar articles
InternetNews
June 22, 2005
Tim Gray
Fronting a Fix on Data Breaches Everyone's pointing fingers and looking for answers as the investigation into a recent leak of credit card accounts at CardSystems Solutions unfolds. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
Bank Systems & Technology
May 5, 2007
Maria Bruno-Britz
Fraud Techniques Evolve in Parallel with Bank Products and Defenses As fraudsters' techniques evolve alongside the products and services offered by financial institutions, new steps must be introduced to stop them. mark for My Articles similar articles
PC World
December 2004
Bob Tedeschi
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. mark for My Articles similar articles
Bank Systems & Technology
April 7, 2006
Peggy Bresnick Kendler
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Bank Systems & Technology
August 2, 2005
Phil Britt
Fighting the New Face of Fraud Technology plays a critical role in banking fraud, both in creating new opportunities for fraud and offering new methods to defend against it. Financial services institutions must take a holistic approach to combating fraud. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
U.S. Banker
September 2004
Karen Krebsbach
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. mark for My Articles similar articles
Financial Advisor
November 2005
Joel Bruckenstein
Securing Yourself And Clients Identity theft poses a serious threat for financial advisors and their clients. Here are steps to take to prevent identity theft and related security concerns. mark for My Articles similar articles
Bank Technology News
December 2009
Rebecca Sausner
Out-of-Band Authentication Gets Outfoxed Banks in the United Kingdom are battling fraudsters that have found a way to compromise out-of-band authentication-an approach supported by many fraud experts. mark for My Articles similar articles
CIO
March 15, 2002
Sarah D. Scalet
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... mark for My Articles similar articles
Bank Technology News
April 2010
Michael Sisk
Fifth Third Banks Charts New Security Course Man-in-the-middle attacks and other assaults on the browser are becoming more common and pose a challenge to the whole banking industry. Fifth Third is taking new security measures. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles
U.S. Banker
March 2003
Melissa Solomon
Is California Asking for Too Much Information? A new law is aimed at protecting customers from identity theft. The disclosures finance companies make could be embarrassing. Not telling could hurt even more. mark for My Articles similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. mark for My Articles similar articles