Join the Community

21,775
Expert opinions
43,887
Total members
474
New members (last 30 days)
201
New opinions (last 30 days)
28,624
Total comments

Latest expert opinions

clear
clear

4169 Results from /regulation

Brett King

Brett King CEO & Founder at Moven

Who killed trust, and when will it return?

During the global financial crisis, governments spent billions to bail out banks in an effort to keep liquidity in the banking sector, largely so that lending could continue at a time when businesses needed as much help as they could get. However, in a financial crisis when the economy is in recession, it is counter-intuitive for a bank to lend mo...

/regulation /retail Finance 2.0

Retired Member

Retired Member 

Basel III:Politicians leading the Banking Regulators

Following my last post in relation to the G20 summit in Seoul (On the brink of entering the Basel III era...) I wanted to share some further thoughts, since the G20 leaders signed off the Basel Committee’s new bank capital and liquidity framework (known as “Basel III”) and committed to adopt and fully implement it by the end of 2012. However, th

/regulation

Jennifer Hanes

Jennifer Hanes EVP Product Management at SunGard

OTC Derivatives Regulation Ready or Not

OTC Derivatives Regulation – Ready or Not? 8 things you need to worry about now With the passage this summer of sweeping regulatory reform in the US, there’s been a lot of discussion around the impact on the over the counter (OTC) derivatives market. There are a number of challenges we think many market participants will face as they...

/regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

CO. Supreme Court Using a Stolen SS Number is Not ID Theft

I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The defendant in this particular case had admitted to using a false Social Security number on an application for a car loan, and to find employment. The cour...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Using Video To Catch a Nasty Neighbor

Living in the Northeast has its pros and cons. We have the four seasons, great food, entertainment, sports, everything is at your fingertips, and for me it’s where business gets done. Drawbacks include lots of congestions, crime, traffic, bad attitudes and nasty neighbors. Most people I know have a neighbor they are in some kind of entanglement wit...

/security /regulation

Retired Member

Retired Member 

On the brink of entering the Basel III era...

The Seoul G20 summit should be the final step before we enter in the “Basel III era”. This set of regulations will mark one of the most significant developments since the original Basel accord in 1988. The summit reforms will have fundamental implications for the global financial system. Basel III will reinforce and extend the scope of balance sh...

/regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Criminal Hackers: The Soldiers of the Web Mob

Today’s criminal hackers are very different than those who hacked for fun and fame a decade ago. Every week, I see stories about more criminals in faraway lands, making millions from various scams, emptying the bank accounts of small businesses or draining the financial reserves of entire towns. High-tech crimes can be committed by lone individual...

/security /regulation

Retired Member

Retired Member 

ANOTHER WEEK GONE. ANOTHER DATA DISASTER AVERTED!

Something happened last week that was so extraordinary, I had to blink and rub my eyes to really believe they weren’t deceiving me! If you have read my blogs before, you will know I regularly highlight the risks of sending sensitive information via email. I am equally concerned about how businesses protect themselves against external attacks, and n...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Botnets Turn Your PC into A Zombie

A botnet is a group of Internet-connected personal computers that have been infected by a malicious application, which allows a hacker to control the infected computers without alerting the computer owners. Since the infected PCs are controlled remotely by a single hacker, they are known as bots, robots, or zombies. Consumers’ and small businesses...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Spear Phishers Know Your Name

“Spear phishing” refers to phishing scams that are directed at a specific target. Like when Tom Hanks was stranded on the island in the movie Cast Away. He whittled a spear and targeted specific fish, rather than dropping a line with bait and catching whatever came by. When phishing attacks are directed at company officers or senior executives, it...

/security /regulation

Now Hiring