4163 Results from /regulation
Retired Member
Two weeks ago I questioned what form a ‘new risk management’ would take and how far the industry is rallied around the 2010 GARP Risk theme of “Transforming Risk into a new world order”. I had hoped that the convention would reveal risk managers finally beginning to understand the vital role data management plays in helping untangle messy inter
24 February 2010 /regulation Data Management 101
"If there are any Mattel engineers in the audience, the astronaut Barby's space suit is not crash proof" (loose paraphrasing on Will Wright's keynote) Yep, the keynote was entertaining and Engage brought a lot of vendors to snowy New York's Javits center. The two day event, though a bit low on developers, had a few interesting sessions a...
23 February 2010 /payments /regulation Innovation in Financial Services
Robert Siciliano Security Analyst at Safr.me
Dan Yost Chief Technology Officer of MyLaptopGPS brought attention to the Ponemon Institute, with sponsorship from PGP, has released their “Fifth Annual U.S. Cost of Data Breach Study.” As usual, the report is a treasure trove of great data (just like most people’s laptops are). The average cost per breached data record rose $2 in 2009, to $204. T...
22 February 2010 /security /regulation
The sheer volume of potential targets coupled with the vast amounts of money to be made has captured the attention of the global criminal hacking community. Enterprise networks are becoming hardened and they are still vulnerable. Some are being penetrated directly while others are accessed through 3rd parities such as their clients or end users. Un...
20 February 2010 /security /regulation
Yes, our data show a correlation between some higher users of social media and identity fraud, yet this story screams of media sensationalism to me. There are just too many variables at play, such as the presence of multiple residents in many homes that are waiting to thwart the would-be burglar. Certainly it's foolish to share too much on social ...
19 February 2010 /security /regulation
Diploma mills were born along with elearning institutions who are actually legitimate and accredited bodies. Degrees and diplomas issued by diploma mills are frequently used for fraudulent purposes, such as obtaining employment, promotions, raises, or bonuses on false pretenses. They can also be used as a form of fake ID when posing as someone els...
17 February 2010 /security /regulation
Botnets are robot networks of computers connected to the Internet that sit in our homes and offices. A botnet is generally banks of multiple PC’s from the 10’s to 10,000’s to millions. There are no hard numbers on botnets but last figure I saw was somewhere between 3-5 million. Another stat is 25 percent of all US based PC’s are on a botnet. That...
I think the report from the University of Cambridge is very interesting and raises some very valid points, despite the fact that it is quite theoretical and could only work in a specific set of circumstances. There are a number of options that the banking community has to prevent fraud of this nature. 1. Do not allow EMV cards to be verified...
16 February 2010 /payments /regulation
A scientist was conducting an experiment with a fly. He pulled off one of its legs and set it down to see if it could fly. Conclusion: a fly without one leg can still fly. He pared off a second leg and set it down, saying "Fly!" Conclusion: a fly without two legs can still fly. He removed all the legs and set the fly on the palm of his h...
14 February 2010 /payments /regulation Innovation in Financial Services
In the University of Cincinnati’s Journal of Homeland Security and Emergency Management, the authors write “The general population must be engaged as active security providers, not simply beneficiaries of security policy, because their practices often create the threats to which government responds.” Somebody is saying to take personal responsibil...
14 February 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.