Similar Articles |
|
Registered Rep. August 15, 2014 Diana Britton |
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it. |
Commercial Investment Real Estate Sep/Oct 2015 Alan Lyons |
Cyber Scares Protect your real estate business from online security breaches. |
Wall Street & Technology November 17, 2003 Jim Middlemiss |
Under Attack Forget about locking the windows and the doors, financial-services firms now have far more to fear from worms, horses and bugs. |
Registered Rep. August 16, 2013 Lauren Barack |
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
National Defense June 2013 Pankowski & Mercer |
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. |
Registered Rep. July 8, 2015 Jerry Gleeson |
The New Sheriffs In 2012, more than 2,000 RIA firms who had only known the regulatory scrutiny of the Securities and Exchange Commission were transitioned over to the Wild West of state securities regulators. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
Inc. April 2007 Dan Briody |
Online Indemnity No two insurance policies are the same, but cyber insurance policies generally include coverage for the incidents listed in this article. |
InternetNews April 8, 2009 Alex Goldman |
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
CIO April 25, 2014 Lucian Constantin |
5 Things You Need to Know About Cybersecurity Insurance Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. |
Registered Rep. June 29, 2010 Halah Touryalai |
The New Sheriffs In Town The SEC examines about 9 percent of the 11,000 or so advisory firms under its jurisdiction annually. All of that is about to change with a little help from regulators at the state level. |
InternetNews March 19, 2009 Kenneth Corbin |
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
InternetNews November 8, 2004 Jim Wagner |
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure. |
InternetNews July 28, 2010 |
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? |
CRM January 19, 2015 Maria Minsker |
Cybersecurity Is Not Just About Protection, but Detection Too Enterprises must prepare to tackle inevitable breaches in 2015. |
Information Today November 7, 2013 George H. Pike |
U.S. Government Releases Proposed Cybersecurity Framework The Obama administration is taking public comments on a proposed framework for improving cybersecurity in communication and other critical industries. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
CRM September 7, 2012 Dale Dabbs |
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. |
The Motley Fool January 25, 2011 Bryan Hinmon |
Protect Your Portfolio From Cyber Threats Defend your portfolio from The Attack of the Killer e-Tomatoes. |
Registered Rep. November 16, 2012 Jerry Gleeson |
Tardy Advisors Get a Reprieve Mid-sized RIAs who are behind on switching their registration from federal to state jurisdictions now have until Dec. 17 to get caught up. |
CIO February 15, 2002 Abbie Lundberg |
Response Ability How do you respond to a computer security incident? |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
CIO March 30, 2015 Michael Friedenberg |
Security crashes the boardroom party This sharpening of cybersecurity focus has forced corporate boards to have conversations they once considered too technical and back-office-oriented. |
Bank Technology News September 2008 Tom Kellermann |
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. |
Information Today May 2005 Phillip Britt |
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. |
U.S. Banker March 2003 Melissa Solomon |
Is California Asking for Too Much Information? A new law is aimed at protecting customers from identity theft. The disclosures finance companies make could be embarrassing. Not telling could hurt even more. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
Investment Advisor August 2005 Thomas D. Giachetti |
Come Right In Here are some issues pertaining to an advisor's compliance-readiness, including a list of some of the more substantive issues that are currently the focus of SEC examiners. |
On Wall Street February 1, 2011 |
Five Questions With David Massey The deputy securities administrator for the state of North Carolina, began a one-year term as president of the North American Securities Administrators Association in September. |
PC Magazine July 1, 2009 Chloe Albanesius |
Obama's Cyberspace Crackdown The president lays out new online security measures. |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
Registered Rep. March 14, 2012 Jerry Gleeson |
The Long Goodbye This year, about 3,200 mid-sized RIAs will say goodbye to the Securities and Exchange Commission, transferring their registration to the states where they do business. |
Information Today October 20, 2015 Barbie E. Keiser |
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. |
CIO April 27, 2015 Stephanie Overby |
Boards are on high alert over security threats Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk. |
InternetNews March 30, 2010 |
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
InternetNews May 28, 2009 Kenneth Corbin |
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. |
National Defense May 2014 Stew Magnuson |
New Cyber Hygiene Campaign Seeks to Curtail Attacks The Center for Internet Security and the Council on CyberSecurity, working with the Department of Homeland Security, the National Governors Association and the Governors Homeland Security Advisors Council launched the Cyber Hygiene Campaign in April. |
InternetNews December 9, 2010 |
Hackers Zero In On Employee Email Accounts Lost or stolen laptops and USB drives are a serious security threat but personal email accounts are becoming an even bigger target for cybercrooks. |