Join the Community

21,768
Expert opinions
43,868
Total members
458
New members (last 30 days)
197
New opinions (last 30 days)
28,622
Total comments

Latest expert opinions

clear
clear

4163 Results from /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Identity Theft Myths Part 1of3

The National Foundation for Credit Counselors, which sponsors Protect Your Identity Week, has compiled a number of identity theft myths. To support their efforts, the Santa Fe Group Vendor Council Awareness and Education Subcommittee has helped to clarify some common misinformation with regards to this increasingly common crime. Myth #1: There’s n...

/security /regulation

Retired Member

Retired Member 

Call for opinion - US withholding tax

Last week saw the largest ever gathering of QIs, NQIs, Auditors, US Withholding Agents and solutions vendors since 2001 when the US withholding tax regulations - 1441 NRA came into force. 100 attendees discussed the impact of US tax regulations for two days. The US Joint Congressional Committee on Tax (JCT) indicated prior to the conference that ...

/regulation /wholesale Innovation in Financial Services

Retired Member

Retired Member 

Mark-to-data?

The American Securitization Forum’s (ASF) work to enable the tracking of individual US mortgages is just one example of the finance world’s renewed faith in fact. This in turn is paving the way for a new ‘mark-to-data’ standard. Toxic assets were originally decoupled from reality and marked-to-models because the industry assumed that there was

/regulation Data Management 101

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

Why Security Guards Stopped me in Capitol Hill

It was a sunny day in Washington DC, and I headed towards Capitol Hill to speak at the Cyber Security Ecosystem briefing organized by TechAmerica. I almost didn’t make it: the security guards caught me red handed. I tried to smuggle an apple into the building. It wasn’t a particularly big apple, mind you. It wasn’t an Apple notebook I failed to de...

/security /regulation Online Banking

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Identity Theft Myths Part 3of3

The National Foundation for Credit Counselors, which sponsors Protect Your Identity Week, has compiled a number of identity theft myths. To support their efforts, the Santa Fe Group Vendor Council Awareness and Education Subcommittee has helped to clarify some common misinformation with regards to this increasingly common crime. We’ve already disc...

/security /regulation

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

The Secret of House MD to Solve Any Problem

ANYONE CAN SOLVE ANY PROBLEM WITH THE RIGHT METHOD. In this blog, I'm gonna reveal the secret that any good MD knows. You will be able to solve any problem efficiently and look smart about it :-) To handle a problem efficiently, we need first to describe what a problem is! Once it's clear we'll see a perfect roadmap to solve any kind of problem

/security /regulation Innovation in Financial Services

Retired Member

Retired Member 

Integrated Data and Analytics Management

What is Integrated Data Management?... At a seminar a week or so back, I was asked the somewhat academic question was "What is Integrated Data Management?". Certainly everyone seemed convinced that there would be less "Enterprise Data Management" (EDM) projects in future, given the expense, scope and scale of such projects. The...

/regulation /wholesale Data Management 101

Stanley Epstein

Stanley Epstein Associate at Citadel Advantage Group

The Mad Hatter's Tea Party

Where has the financial services industry gotten itself to in these past two decades or so? I have just been reading the Financial Services Authority's proposals regarding the reform of the mortgage market in the UK. What on earth has happened to basic lending principles? The FSA speaks of a changed approach to a more "intrusive and intervent...

/regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

12 Awful Reasons Why Impostors Commit Social Media ID Theft

Imagine if someone used your name and image, or the name and logo of a business you own, to create a profile on Facebook, Twitter, or any other social networking website. Then they start posting blogs and sending out links while pretending to be you. They may contact your acquaintances, colleagues, or clients, or they may simply show up when other...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Join us for National protect your Identity Wk October 17-24

See us at the the Identity Theft Protection Blog and the 2009 National Protect Your Identity Week. In order to solve this massive problem, it is absolutely essential that you – the public, corporations, associations and government agencies, all take responsibility and do what is necessary to protect yourself, your clients and your constituents. Id...

/security /regulation

Now Hiring