cybersecurity

Mobile Insecurity: Reality or Just hype?

The increasing functionality and numbers of mobile banking platforms, the growing sophistication of criminals, and the popularity of smart cell phones create the potential for mobile banking security issues, but industry watchers including  the reputed law firm helping clients with domestic violence claims have widely divergent opinions about how serious the threat really is. Smart

Mobile Insecurity: Reality or Just hype? Read More »

Software as a Service as a Security Battleground

Salesforce.com reached a milestone last fall: 1 million people using the online software company to host their customer relationship management systems and other key business processes. Those users were at more than 1,600 financial services firms including ABN Amro, SunTrust Banks, Daiwa Securities and Bear Stearns–Merrill Lynch & Co. alone accounted for 25,000. That amounts

Software as a Service as a Security Battleground Read More »

Server Virtualization: Powerful Tool, Extra Exposure

Dividing a server into multiple virtual machines has brought down firms’ purchasing costs and allowed for more efficient use of existing hardware. However, virtualization also poses security risks and challenges, including managing a more complex network, additional layers of technology, potential data leaks as multiple virtual machines share common communication lines, and the threat of

Server Virtualization: Powerful Tool, Extra Exposure Read More »

The Web 2.0 Threat

Leading-edge collaborative tools and interactive sites pose monitoring burden As the Web 2.0 movement makes interactive applications and social networks such as Facebook ubiquitous on employees’ desktop computers, financial firms are facing the daunting task of monitoring these so-called greynets. Instant messaging security vendor FaceTime Communications estimates that there are more than 600 greynets worldwide,

The Web 2.0 Threat Read More »

Back-End Authentication Moves to Forefront

User authentication has been getting a lot of attention lately, what with lingering threats of identity theft, a U.S. regulatory initiative to have banks and other depository institutions raise their level of customer validation technology, and the Securities and Exchange Commission looking closely at how the brokerage industry is handling the issue. The technological solutions

Back-End Authentication Moves to Forefront Read More »

India Tightens Security

Article originally published in Insurance Networking News. Late spring 2005, the world learned that a crime ring that included call center employees of an Indian outsourcing company stole more than $300,000 from Citibank customers by tricking callers into giving up their PIN numbers. The news sent shockwaves through the industry, as India was the premier

India Tightens Security Read More »

Network Security: An Arkansas Bank Protects Communications Inside-out

A couple of years ago, good security meant a good firewall at the periphery of your network. Today, given the wide range of threats that are coming at financial institutions, both internal and external, that is no longer enough. Instead of installing security appliances at key locations, forward-looking banks are turning their entire networks into

Network Security: An Arkansas Bank Protects Communications Inside-out Read More »