Join the Community

21,469
Expert opinions
43,716
Total members
378
New members (last 30 days)
131
New opinions (last 30 days)
28,520
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

Metadata catches politicians out again...and again..

What is it about politics and embarrassing metadata? UK readers will be familiar with the row about dodgy political donations that is currently surrounding the Labour party. It was perhaps only a matter of time before metadata gave someone's secrets away - as it has a habit of doing in political rows. Well, it happened this weekend - the Sunday...

/security /regulation

Retired Member

Retired Member 

ILP - it's always someone else's fault

Given that much of my time spent in conversations around metadata leakage being someone else's fault / responsibility, it was fascinating to watch the Chancellor's performance in the House this afternoon. That smoking gun certainly has a lot of fingerprints on it. Mind you, today's news will certainly raise the profile of Information Leak Preventi...

/security /regulation

Retired Member

Retired Member 

Credit card numbers fraud; what is the hidden cost?

Perhaps we should not be surprised, but every time one of these stories concerning multi-million dollar organised cyber crime hits the headlines, the sheer scale of the operation is startling, even to an ex-Banker. It would seem that if credit card numbers - or indeed other personal information - gets out ‘into the wild’ then there is a certain in...

/security

Retired Member

Retired Member 

A Fintech Opportunity in National Security

In July, 2003, the Pentagon's Defense Advanced Research Projects Agency (DARPA) scuttled an ill-conceived terrorism futures market. While the project was a political failure, the idea underscores the ongoing need for innovative thought in the area of indications & warning (I&W). The construction of a terror futures exchange wherein marke...

Retired Member

Retired Member 

Disappointing....

Very disappointing, as I am sure we all agree. Doubly so knowing Lord Erroll's dedication and enthusiasm for the work of the Committee (having heard his impassioned views on the issues at our recent Information Security dinners). Perhaps the Government should be more aware of the content of the FSA's Market Watch newsletters...

/security /regulation

Retired Member

Retired Member 

Those embarrassing little - and not so little - leaks

Interestingly, this was exactly the topic of conversation at a couple of CIO / CTO level Information Security dinners that we have hosted in the city recently, and follows hot (OK, warm) on the heels of the FSA's Market Watch newsletter on Market Conduct and Transaction Reporting Issues, with accidental leaks of sensitive information being a key i...

/security /regulation

Retired Member

Retired Member 

Top 100 Network Security Tools

Fyodor, the author of the popular Nmap FOSS for network exploration or security auditing, has released the list of the top 100 network security tools (excluding Nmap). He has compiled the list based on the responses from 3,243 people in the Nmap mailing list. Relating to my post on the malware attack on BoI, I think that the sysadmins of the bank...

/security

Retired Member

Retired Member 

Fallen Citadel: Malware Attack on Bank of India

Story URL: http://www.theregister.co.uk/2007/09/01/bank_of_india_website_takeover/ The recent, crippling, malware attack on the website of Bank of India (http://www.bankofindia.com) is a stark reminder of how far away are the banks from offering secure net banking facilities. Obviously, BoI is not the only bank to suffer from a security lapse; mo...

Retired Member

Retired Member 

The Insider Threat

Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a growing awareness of the need to control outbound information flow as well as inbound? Certainly there have been more press articles on this topic of...

/security

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

HSBC Australia shoots the messenger

Banks and their customers have very different ideas about what constitutes "sensitive data", and what communication should take place if data security is compromised. And one bank in particular has an interesting approach to managing the media fall-out when such a lapse occurs. Over the past 6 weeks, a journalist at Computerworld Austr...

/security /retail

Now Hiring