Finance & insurance industry News
February 16, 2017
Those who aspire to an IT operations career must learn to code, says a former FINRA CTO who works with financial institutions as a DevOps consultant.
February 01, 2017
Thanks to a polarizing election, the potential ramifications of cybersecurity attacks are front and center. Your friends and relatives probably have some concept of what it is that you actually do and its importance. But the daily challenges of protecting most enterprise environments is less like The Americans than they might think. Still, it's exciting. In this issue of Information Security magazine, we look at the incoming threats in 2017 and some countermeasures that can help your organization bolster its defenses.
Last year, we saw the internet of things used as a beachhead in larger cybersecurity attacks. Many devices now use cloud-based systems to communicate. They regularly send status updates to the cloud server and retrieve new commands to execute. Weak and incorrectly implemented authentication between device and cloud is often the point of failure that can be exploited to either attack the cloud infrastructure or the device. So far, destructive attacks are not common and are mostly limited to distributed denial-of-service attacks, which do not cause permanent damage. But future attacks, if they are combined with ransom demands, may destroy devices intentionally.
Breaches of cloud storage that modify data instead of just "stealing" it and vulnerabilities in microservices environments are other areas in which attackers may get more leverage. With the emergence of cloud-based microservices, this problem will only become worse. Instead of including a library in software shipped to clients, the software now relies on cloud-based web services to perform certain functions. We look at what is coming next and ways to mitigate these cybersecurity attacks.
January 31, 2017
Goldman provides its clients with sophisticated services by partnering with startups like Kensho Technologies.
January 20, 2017
Researchers find the Carbanak gang has evolved its attacks on financial institutions to use Google services for command and control infrastructure in malware.
Finance & insurance industry Get Started
Bring yourself up to speed with our introductory content
Blockchain, while still an emerging solution, is one of the more intriguing technologies with potential to set us down the road towards a secure IoT world. Continue Reading
The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government. Continue Reading
Cybersecurity and blockchain received a lot of attention in 2016, and both trends are expected to remain on the radars of healthcare executives in 2017. Continue Reading
Evaluate Finance & insurance industry Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A series of major FDIC cybersecurity data breaches has created a chaotic situation and highlights the importance of strong, well-intentioned security leadership in organizations. Continue Reading
As more enterprises consider blockchain technology, IT services firms and consultancies have an opportunity to discuss adoption strategy and deployment options with their clients. Continue Reading
This issue of SearchHealthIT's Pulse zeroes in on vendor neutral archives -- a distinctive, medical imaging technology in healthcare designed to allow providers to view images in a standard format.
The market for medical imaging management is huge -- possibly worth almost $6 billion by 2021, and in order to grab their share, vendors must adapt and enhance their products. Our cover story explores the state of the vendor neutral archive (VNA) market and looks at how one children's hospital envisions the future use of its medical imaging technology system.
Following up on that notion comes a 2017 wish list, in which three health IT experts explain what future VNA features they'd like to see. A standards-based approach tops that list. Elsewhere in Pulse, a Gartner analyst helps us debunk some of the myths behind the use of blockchain in healthcare, and find out what steps personal health record vendors need to take for a more successful foray into patient engagement.Continue Reading
Manage Finance & insurance industry
Learn to apply best practices and optimize your operations.
SD-WAN deployments can benefit a number of industries, providing improved performance and lower costs. Expert Lee Doyle looks at three of the top SD-WAN verticals. Continue Reading
SWIFT banking has a team dedicated to data breach investigations. Expert Mike O. Villegas discusses why this is necessary and whether other organizations should follow suit. Continue Reading
High-end application developer Atimi Software uses cloud-based PrimeRevenue to trade receivables from Kellogg to financiers and receive earlier payments in exchange for small fee. Continue Reading
Problem Solve Finance & insurance industry Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises with open FTP servers are being targeted by Miner-C malware for crypto coin mining activities. Expert Nick Lewis explains how enterprises can protect their servers. Continue Reading
Proper IT budget planning and cost optimization can extend the life of your infrastructure, help guide refresh decisions and prepare you for software-defined architectures. Continue Reading
The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading