Sign up for free newsletter

 

Jason Elmer, Duff & Phelps

Duff & Phelps - Best North American Cyber-Security Services Provider

Tue, 10/10/2017 - 17:32

The Duff & Phelps' cybersecurity services practice takes a leading role in helping financial services companies implement best practices to prepare for, respond to and, if necessary, recover from a cybersecurity attack. »

Picture of text being disclosed by a magnifying glass

SEC discloses 2016 cybersecurity breach

Thu, 21/09/2017 - 15:34

SEC Chairman Jay Clayton has issued a statement highlighting the importance of cybersecurity to the agency and market participants, and detailing the agency’s approach to cybersecurity as an organisation and as a regulatory body. »

AI and machine learning

The role of AI and machine learning in cybersecurity

Thu, 14/09/2017 - 10:53

By George Ralph, RFA – The use of Artificial Intelligence is becoming decidedly commonplace. Wikipedia describes AI research as “the study of intelligent agents: any device that perceives its environment and takes actions that maximise its chance of success at some goal.” AI is often used interchangeably with Machine Learning, which is described as the subfield of computer science that, according to Arthur Samuel, gives "computers the ability to learn without being explicitly programmed." »

Cybersecurity

Eze Castle Integration publishes whitepaper exploring cybersecurity threats and best practices for private equity firms

Thu, 07/09/2017 - 14:42

Eze Castle Integration, a managed services provider to the financial industry, has published a new whitepaper exploring strategies and best practices for private equity firms to protect data, assets, and corporate interests in the midst of growing cybersecurity threats.  »

The Private Equity CTO: Business strategist, cyber czar

Thu, 17/08/2017 - 12:57

Technology innovation and evolution has had a profound effect on many jobs, perhaps most notably for a firm’s Chief Technology Officer. Once tasked with desktop support and server maintenance, these IT executives have seen their job descriptions change dramatically over the years. But that change doesn’t necessarily signal something negative. »

Help button

Incident response: A step-by-step guide to dealing with a security breach

Fri, 11/08/2017 - 09:26

If your firm hasn’t fallen prey to a security breach, you’re probably one of the lucky ones. But you also probably won't be safe for long, as most firms, at some point in time, will encounter a cybersecurity incident. Cyber incidents today come in many forms, but whether a system compromise at the hands of an attacker or an access control breach resulting from a phishing scam, firms must have documented incident response policies in place to handle the aftermath. »

Kaleigh Alessandro, Eze Castle Integration

An achievable calendar for cyber security plan implementation

Tue, 08/08/2017 - 09:45

By Kaleigh Alessandro (pictured), Eze Castle Integration – Keeping up with the myriad of cyber security requirements expected of today’s financial firms is a daunting – and sometimes unachievable – task. This list continues to grow in size and scope, and remembering how often to perform tests or when to change passwords is a growing challenge for CTOs and business execs responsible for technology. »

Ransomeware

Five ransomware prevention tips to thwart future cyber attacks

Thu, 03/08/2017 - 09:38

Ransomware threats are on the rise – WannaCry and Petya are just the beginning. To prevent future cyber threats from causing harm, financial and investment firms should employ security practices that include deep layers of protection. Here are five suggestions to keep in mind:  »

Seven steps to success

Seven steps to avoid a cyber-attack

Thu, 27/07/2017 - 11:00

By George Ralph, RFA – We all know that cyber-attacks are not only more prevalent but they are increasing in ferocity, becoming ever more ambitious and overt. The latest culprits, Petya and WannaCry both used phishing attacks to spread malware through networks, and Petya rendered the user’s computer inoperable and gave hackers full access to the usernames and passwords stolen from the computer. »

Dirty data

Is your data dirty? Data hygiene best practices for financial services

Fri, 21/07/2017 - 08:37

The most vital asset a business controls is its information. As the driver of many business processes, data is a powerful tool, and therefore has to be secure, accurate and accounted for. When this sensitive information gets into the wrong hands, it can cause serious damage to a firm’s business operations and reputation.  »

Pages

specialreports
other gfm publications