Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the...
Understanding the trends and patterns of the past is the key to understanding the future, and security is no exception. The following security threat trends for 2008 have been assembled as a result of their frequency during security audits performed last year. These common and fundamental security issues typically...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Archiving is the long-term storage of information in a repository, usually compressed to reduce storage space. Archiving information helps reduce data loss, as it ensures that everything will never get lost and can always be accessed. Top priorities all in this era of e-discovery and computer forensics.
With the heightened demands of regulatory compliance and e-discovery, managed message security and archiving is a huge challenge for financial institutions. Read this interview for expert advice from Lee Rothman, Sales Engineer at MessageLabs Inc., on archiving, including:
Today's top challenges;
How other...
Security Strategies from Lee Rothman of MessageLabs
With the heightened demands of regulatory compliance and e-discovery, managed message security and archiving is a huge challenge for financial institutions. Listen to this interview for expert advice from Lee Rothman, Sales Engineer at MessageLabs Inc., on...
It's a project that really represents about a year's worth of work and organization on our part, and on yours too. We started months ago. Information Security Media Group just started to visualize this project, the issues that we wanted to talk about - knowing the regulatory issues that were coming down, things that...
It's well-known that network communication is susceptible to eavesdropping and packet sniffing software looking for sensitive information. To avoid these traps, there are secure methods for communicating in the workplace between employees and outside of the company network.
The "pump 'n' dump" stock scam has been around since the inception of stock sales. Today, however, after a series of fumbles by amateurs, serious Internet criminals are taking this scam to new levels, deploying it through:
Images
PDFs
Botnets
And more
In this white paper you will learn more about the...
No other industry faces governmental compliance scrutiny like the financial-services firms do. The increased number and frequent revision of federal, state, local, and international rules has created an unprecedented burden on companies to comply. Companies affected include:
Brokers/dealers
Mutual fund...
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
Feel like you're canned in by the spam emails in your inbox? Don't despair, here are some common sense tips to help stop spam from getting to your email inbox.
The Federal Trade Commission’s second summit on Spam in the last four years addressed the growing problem of unsolicited emails that is creating costs for businesses and consumers alike.
FTC Chairman Deborah Platt Majoras addressed the summit held July 11-12 in Washington, D.C. “The volume of spam...
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.