Join the Community

21,768
Expert opinions
43,868
Total members
458
New members (last 30 days)
197
New opinions (last 30 days)
28,622
Total comments

Latest expert opinions

clear
clear

4163 Results from /regulation

Retired Member

Retired Member 

'New Risk Management' Needs Accurate Data

Two weeks ago I questioned what form a ‘new risk management’ would take and how far the industry is rallied around the 2010 GARP Risk theme of “Transforming Risk into a new world order”. I had hoped that the convention would reveal risk managers finally beginning to understand the vital role data management plays in helping untangle messy inter

/regulation Data Management 101

Retired Member

Retired Member 

New York under zero: some thoughts on the Engage! Expo

"If there are any Mattel engineers in the audience, the astronaut Barby's space suit is not crash proof" (loose paraphrasing on Will Wright's keynote) Yep, the keynote was entertaining and Engage brought a lot of vendors to snowy New York's Javits center. The two day event, though a bit low on developers, had a few interesting sessions a...

/payments /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

The 6.75 Million Dollar Laptop

Dan Yost Chief Technology Officer of MyLaptopGPS brought attention to the Ponemon Institute, with sponsorship from PGP, has released their “Fifth Annual U.S. Cost of Data Breach Study.” As usual, the report is a treasure trove of great data (just like most people’s laptops are). The average cost per breached data record rose $2 in 2009, to $204. T...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

The State of Information Security Sucks

The sheer volume of potential targets coupled with the vast amounts of money to be made has captured the attention of the global criminal hacking community. Enterprise networks are becoming hardened and they are still vulnerable. Some are being penetrated directly while others are accessed through 3rd parities such as their clients or end users. Un...

/security /regulation

Retired Member

Retired Member 

This screams of media sensationalism

Yes, our data show a correlation between some higher users of social media and identity fraud, yet this story screams of media sensationalism to me. There are just too many variables at play, such as the presence of multiple residents in many homes that are waiting to thwart the would-be burglar. Certainly it's foolish to share too much on social ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Diploma Mills Facilitate Identity Theft

Diploma mills were born along with elearning institutions who are actually legitimate and accredited bodies. Degrees and diplomas issued by diploma mills are frequently used for fraudulent purposes, such as obtaining employment, promotions, raises, or bonuses on false pretenses. They can also be used as a form of fake ID when posing as someone els...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

mCrimes Morph Into mBotnets

Botnets are robot networks of computers connected to the Internet that sit in our homes and offices. A botnet is generally banks of multiple PC’s from the 10’s to 10,000’s to millions. There are no hard numbers on botnets but last figure I saw was somewhere between 3-5 million. Another stat is 25 percent of all US based PC’s are on a botnet. That...

/security /regulation

Retired Member

Retired Member 

Moving forward with EMV

I think the report from the University of Cambridge is very interesting and raises some very valid points, despite the fact that it is quite theoretical and could only work in a specific set of circumstances. There are a number of options that the banking community has to prevent fraud of this nature. 1. Do not allow EMV cards to be verified...

/payments /regulation

Retired Member

Retired Member 

Fraud detection and UE: why are Millennials slower?

A scientist was conducting an experiment with a fly. He pulled off one of its legs and set it down to see if it could fly. Conclusion: a fly without one leg can still fly. He pared off a second leg and set it down, saying "Fly!" Conclusion: a fly without two legs can still fly. He removed all the legs and set the fly on the palm of his h...

/payments /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Citizens Need to be More Involved in Cybersecurity

In the University of Cincinnati’s Journal of Homeland Security and Emergency Management, the authors write “The general population must be engaged as active security providers, not simply beneficiaries of security policy, because their practices often create the threats to which government responds.” Somebody is saying to take personal responsibil...

/security /regulation

Now Hiring