Windows 7

Finance & insurance industry News

  • February 16, 2017 16 Feb'17

    Former FINRA CTO: Writing's on the wall for IT operations careers

    Those who aspire to an IT operations career must learn to code, says a former FINRA CTO who works with financial institutions as a DevOps consultant.

  • February 01, 2017 01 Feb'17

    In 2017, cybersecurity attacks will follow your data

    Thanks to a polarizing election, the potential ramifications of cybersecurity attacks are front and center. Your friends and relatives probably have some concept of what it is that you actually do and its importance. But the daily challenges of protecting most enterprise environments is less like The Americans than they might think. Still, it's exciting. In this issue of Information Security magazine, we look at the incoming threats in 2017 and some countermeasures that can help your organization bolster its defenses.

    Last year, we saw the internet of things used as a beachhead in larger cybersecurity attacks. Many devices now use cloud-based systems to communicate. They regularly send status updates to the cloud server and retrieve new commands to execute. Weak and incorrectly implemented authentication between device and cloud is often the point of failure that can be exploited to either attack the cloud infrastructure or the device. So far, destructive attacks are not common and are mostly limited to distributed denial-of-service attacks, which do not cause permanent damage. But future attacks, if they are combined with ransom demands, may destroy devices intentionally.

    Breaches of cloud storage that modify data instead of just "stealing" it and vulnerabilities in microservices environments are other areas in which attackers may get more leverage. With the emergence of cloud-based microservices, this problem will only become worse. Instead of including a library in software shipped to clients, the software now relies on cloud-based web services to perform certain functions. We look at what is coming next and ways to mitigate these cybersecurity attacks.

  • January 31, 2017 31 Jan'17

    Goldman Sachs builds digital ecosystem, not empire, to serve clients

    Goldman provides its clients with sophisticated services by partnering with startups like Kensho Technologies.

  • January 20, 2017 20 Jan'17

    Carbanak gang using Google services for command and control

    Researchers find the Carbanak gang has evolved its attacks on financial institutions to use Google services for command and control infrastructure in malware.

View All News

Finance & insurance industry Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Finance & insurance industry Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • How major FDIC cybersecurity issues highlight leadership failures

    A series of major FDIC cybersecurity data breaches has created a chaotic situation and highlights the importance of strong, well-intentioned security leadership in organizations. Continue Reading

  • Blockchain technology, applications spark channel opportunities

    As more enterprises consider blockchain technology, IT services firms and consultancies have an opportunity to discuss adoption strategy and deployment options with their clients. Continue Reading

  • VNAs must push medical imaging technology boundaries

    This issue of SearchHealthIT's Pulse zeroes in on vendor neutral archives -- a distinctive, medical imaging technology in healthcare designed to allow providers to view images in a standard format.

    The market for medical imaging management is huge -- possibly worth almost $6 billion by 2021, and in order to grab their share, vendors must adapt and enhance their products. Our cover story explores the state of the vendor neutral archive (VNA) market and looks at how one children's hospital envisions the future use of its medical imaging technology system.

    Following up on that notion comes a 2017 wish list, in which three health IT experts explain what future VNA features they'd like to see. A standards-based approach tops that list. Elsewhere in Pulse, a Gartner analyst helps us debunk some of the myths behind the use of blockchain in healthcare, and find out what steps personal health record vendors need to take for a more successful foray into patient engagement.

     Continue Reading

View All Evaluate

Manage Finance & insurance industry

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Finance & insurance industry Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchWinIT

SearchEnterpriseDesktop

SearchVirtualDesktop

Close