4444 Results from /regulation
Stephen Wilson Managing Director at Lockstep Consulting
OMG. Eugene Kaspersky wants an Internet Passport because he says "anonymity causes security headaches and should be outlawed". This is madness. The social repurcussions are surely obvious, while it's not clear what problem it might solve. Most cybercrime is actually linked to an excess of arbitrary identification, with inadequate safe...
28 October 2009 /security /regulation Online Banking
Robert Siciliano Security Analyst at Safr.me
The National Foundation for Credit Counselors, which sponsors Protect Your Identity Week, has compiled a number of identity theft myths. To support their efforts, the Santa Fe Group Vendor Council Awareness and Education Subcommittee has helped to clarify some common misinformation with regards to this increasingly common crime. Myth #1: There’s n...
26 October 2009 /security /regulation
Retired Member
Last week saw the largest ever gathering of QIs, NQIs, Auditors, US Withholding Agents and solutions vendors since 2001 when the US withholding tax regulations - 1441 NRA came into force. 100 attendees discussed the impact of US tax regulations for two days. The US Joint Congressional Committee on Tax (JCT) indicated prior to the conference that ...
26 October 2009 /regulation /wholesale Innovation in Financial Services
The American Securitization Forum’s (ASF) work to enable the tracking of individual US mortgages is just one example of the finance world’s renewed faith in fact. This in turn is paving the way for a new ‘mark-to-data’ standard. Toxic assets were originally decoupled from reality and marked-to-models because the industry assumed that there was
26 October 2009 /regulation Data Management 101
Uri Rivner CEO and Co-Founder at Refine Intelligence
It was a sunny day in Washington DC, and I headed towards Capitol Hill to speak at the Cyber Security Ecosystem briefing organized by TechAmerica. I almost didn’t make it: the security guards caught me red handed. I tried to smuggle an apple into the building. It wasn’t a particularly big apple, mind you. It wasn’t an Apple notebook I failed to de...
26 October 2009 /security /regulation Online Banking
The National Foundation for Credit Counselors, which sponsors Protect Your Identity Week, has compiled a number of identity theft myths. To support their efforts, the Santa Fe Group Vendor Council Awareness and Education Subcommittee has helped to clarify some common misinformation with regards to this increasingly common crime. We’ve already disc...
25 October 2009 /security /regulation
Cedric Pariente Stanford Certified Project Manager at EFFI Consultants
ANYONE CAN SOLVE ANY PROBLEM WITH THE RIGHT METHOD. In this blog, I'm gonna reveal the secret that any good MD knows. You will be able to solve any problem efficiently and look smart about it :-) To handle a problem efficiently, we need first to describe what a problem is! Once it's clear we'll see a perfect roadmap to solve any kind of problem
23 October 2009 /security /regulation Innovation in Financial Services
What is Integrated Data Management?... At a seminar a week or so back, I was asked the somewhat academic question was "What is Integrated Data Management?". Certainly everyone seemed convinced that there would be less "Enterprise Data Management" (EDM) projects in future, given the expense, scope and scale of such projects. The...
22 October 2009 /regulation /wholesale Data Management 101
Stanley Epstein Associate at Citadel Advantage Group
Where has the financial services industry gotten itself to in these past two decades or so? I have just been reading the Financial Services Authority's proposals regarding the reform of the mortgage market in the UK. What on earth has happened to basic lending principles? The FSA speaks of a changed approach to a more "intrusive and intervent...
21 October 2009 /regulation
Imagine if someone used your name and image, or the name and logo of a business you own, to create a profile on Facebook, Twitter, or any other social networking website. Then they start posting blogs and sending out links while pretending to be you. They may contact your acquaintances, colleagues, or clients, or they may simply show up when other...
20 October 2009 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.