Wall Street & Technology is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Outsourcing Trends on Wall Street: Changing Attitudes
When considering outsourcing vendors, it is important to analyze the intangibles — to look beyond cost, schedule and compliance. The right partner should be of comparable size; for mid-size buyers, global brands most often do not translate to quality.
Top 7 Financial Services Hacks By The Numbers
Are you up to date on the latest string of hacks and thefts that have cost financial institutions multimillions of dollars? From Anonymous's hactivism to the most recent credit card scandal, here are the most interesting 2013 data breaches to hit the headlines.
Banks Fight Back Against Cybercrime
As cybercrime evolves, financial institutions are sharing threat information and collaborating to improve defenses.
Quantum Dawn 2: The Aftermath
With cyber attacks being one of the biggest threats to financial institutions, cyber exercises like Quantum Dawn 2 and other security measures become imperative.
The #1 Myth about Security Information and Event Management (SIEM)
Probably the most popular myth deceiving IT security professionals today is that Security Information and Event Management (SIEM) software is a sufficiently-robust solution for keeping a close eye on sensitive data and – and to send alerts when anything suspicious happens to it. However, SIEMs can only report on logs they can see - therefore another type of user activity monitoring software is needed to ensure data remains secure.
Virtual Trading Clubs: The Next Big Thing?
With economic pressures impacting the sell side, social media technology could play a role in helping buy side firms form trusted relationships with counterparties.
Squeezing Your Cyber Response Curve
Financial firms must be more efficient in detecting and responding to cyber threats.
|