Community
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
As the owner, you will also give up ownership if you leave this group.
Retired Member
Interestingly, this was exactly the topic of conversation at a couple of CIO / CTO level Information Security dinners that we have hosted in the city recently, and follows hot (OK, warm) on the heels of the FSA's Market Watch newsletter on Market Conduct and Transaction Reporting Issues, with accidental leaks of sensitive information being a key i...
24 September 2007 /security /regulation
Fyodor, the author of the popular Nmap FOSS for network exploration or security auditing, has released the list of the top 100 network security tools (excluding Nmap). He has compiled the list based on the responses from 3,243 people in the Nmap mailing list. Relating to my post on the malware attack on BoI, I think that the sysadmins of the bank...
04 September 2007 /security
Story URL: http://www.theregister.co.uk/2007/09/01/bank_of_india_website_takeover/ The recent, crippling, malware attack on the website of Bank of India (http://www.bankofindia.com) is a stark reminder of how far away are the banks from offering secure net banking facilities. Obviously, BoI is not the only bank to suffer from a security lapse; mo...
03 September 2007
Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a growing awareness of the need to control outbound information flow as well as inbound? Certainly there have been more press articles on this topic of...
15 August 2007 /security
Elton Cane Digital product delivery at News Corp Australia
Banks and their customers have very different ideas about what constitutes "sensitive data", and what communication should take place if data security is compromised. And one bank in particular has an interesting approach to managing the media fall-out when such a lapse occurs. Over the past 6 weeks, a journalist at Computerworld Austr...
04 May 2007 /security /retail
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.