Join the Community

21,469
Expert opinions
43,716
Total members
378
New members (last 30 days)
131
New opinions (last 30 days)
28,520
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Aileen Allkins

Aileen Allkins Chief Revenue Officer at YNV Tech Talent

Fending off the fraudsters: how organisations can protect themselves from cyberattacks

In 2015, a senior executive at Mattel received an email from the company’s newly appointed CEO. The note requested the processing of an overdue payment to a familiar manufacturer. In acting on the email, the executive set-in motion a $3 million mistake. Cyber attacks of this kind are known as ‘whaling’ emails, which rather than the ‘copy-paste’ met...

/security /people

Aare Reintam

Aare Reintam Chief Operating Officer at CybExer Technologies

Achieving Zero Trust in Finance as Digital Ecosystems Grow in Complexity

Those of us who work in the cyber security industry have been talking about Zero Trust for more than a decade now. During that time, it’s fair to say that the financial services industry has become relatively good at verifying the identity of actors within and outside its dedicated networks. Unfortunately though, while defining best practices for ...

/security

Ameesh Divatia

Ameesh Divatia Co-founder and CEO at Baffle

Protecting and Sharing Financial Data is not Easy — Here’s How to Do It

Data represents both a huge opportunity and a significant risk for companies in the financial services industry. On the one hand, data sharing and analytics can help organizations uncover a wide array of insights that can offer market differentiation, such as customer preferences and intent, marketing opportunities and motivation for more efficien...

/security

Luke Watts

Luke Watts Managing Director at RoundWorks IT

Microsoft 365 vs Google Workspace: Which is Better?

Microsoft Office used to be the only office software that mattered (at least in the business world). Now, Microsoft is working to sideline its traditional office software in favour of its cloud-orientated counterpart Microsoft 365. That in turn is facing serious competition from Google Workspace. If you’re choosing between them, this is what you n...

/cloud

Philip Chethalan

Philip Chethalan Marketing Manager at Subex

Best Practices, Challenges and Trends in Employee Onboarding for BPOs

Employee Onboarding effectiveness defines whether your employee will be engaged or disengaged at work, depending on the impression created on them. Poorly managed onboarding can lead to abandonment, especially for youngsters. According to an SHRM article: 69% of employees stay longer with good onboarding A structured onboarding program will make 5...

/people /identity

Tristan Hinsley

Tristan Hinsley Cybersecurity Engineer at TDI Security - tdisecurity.com

5 Reasons to Use Cybersecurity Performance Management (CPM)

Over the last half decade, industry insiders around the world have watched cybersecurity budgets balloon astronomically to fight the ongoing threats facing businesses everywhere. The rise of ransomware, the constant assault of phishing attacks, the never-ending list of vulnerabilities, it all culminates in a diverse threat profile that requires a ...

/security

Steve Bradford

Steve Bradford Senior Vice President EMEA at SailPoint

The allure of fraud – and how to protect against it

2022 has so far seen an insatiable appetite for stories of fraud. From ‘The Tinder Swindler’ Simon Leviev fooling potential love interests into giving him millions of dollars to escape his "enemies”, to con artist Anna Delvey winning the hearts and purses of New York’s social elite in ‘Inventing Anna’, fraud has become the most popular topic ...

/security /identity

Boris Bialek

Boris Bialek Field CTO, Industry Solutions at MongoDB

How to create a zero trust environment in financial services

It wasn’t that long ago that security professionals protected their IT in much the same way that mediaeval guards protected a walled city – they made it as difficult as possible to get inside. But once someone was past the perimeter, they had generous access to the riches contained within. In the financial sector, this means access to personal ide...

/security /cloud

René Hendrikse

René Hendrikse Vice President & Managing Director, EMEA & LATAM at Mitek

Here’s why (and how) the world should remove the need for passwords

Are you a good password user? If you have different passwords for every account, each a unique configuration of letters, numbers, capitals, and symbols, perhaps you are. No one can access your accounts. Including you. Today, to access our many online accounts, each of us has an average of a hundred passwords. We need the accounts to access modern l...

/security /crime

Todd Carroll

Todd Carroll CISO at CybelAngel

The Three Worst Financial Industry Data Leaks

Banks, fintechs and other financial institutions have a unique responsibility to maintain the highest level of data security. Billions of people trust them with highly sensitive personal information, ranging from credit scores to home addresses, birth dates and social security numbers. However, this data means that banks are very attractive targ...

/security /crime

Now Hiring