Finance & insurance industry News
September 17, 2015
There is a growing concern for cyberespionage in U.S. after a financially motivated hacker group stole inside information to make millions from insider trading schemes.
August 18, 2015
Kyle Hilgendorf discusses the harnessing and monetization of IoT data, infrastructure peaks and IoT data retention considerations.
August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
July 31, 2015
Database pioneer Michael Stonebraker told an MIT conference that data curation tools offer a step forward on data integration. Others said things are already progressing through other means.
Finance & insurance industry Get Started
Bring yourself up to speed with our introductory content
Big data creates a big test for enterprises: finding the right employees who can meld the technology and business needs in a way to make the data useful. Continue Reading
State cybersecurity regulations may mean compliance will get more complicated, and that has experts worried. Learn what's causing this trend and what organizations should prepare for. Continue Reading
The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment. Continue Reading
Evaluate Finance & insurance industry Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Companies are investing in cybersecurity startups to reap the benefits of working with problem-solving technology. Continue Reading
Expert Ed Tittel describes use cases for Web fraud detection systems and products and explains how they can increase account and transaction security. Continue Reading
A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why. Continue Reading
Manage Finance & insurance industry
Learn to apply best practices and optimize your operations.
Attackers have found a loophole in SPF verification and are using the .gov top-level domain to trick users with phishing emails. Expert Nick Lewis explains how to defend against the threat. Continue Reading
Business teams in countless enterprises are freely availing themselves of the perks of cloud applications, of which there are many, including improved productivity and more efficient business processes. However, the IT departments at many of these enterprises are kept totally out of the loop, exposing these organizations to security risks and wasteful spending. What's a CIO to do to get a grip on her enterprise's cloud inventory? In this issue of CIO Decisions, explore how CIOs are using cloud inventory management to reduce risks, target app consolidation needs and realize greater ROI.
Also in this issue, we take a look at how Hardee's leaves upselling to an algorithm and how Forbes, CBS and other big-name companies use partnerships to drive digital projects. In addition, we get a headhunter's take on how midmarket CIOs can cash in on private equity deals; investigate why taking ethics into account early in the design process should be part of the CIO's agenda; and look into how The New York Times' former CIO broke down the media company's digital barriers.Continue Reading
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches. Continue Reading
Problem Solve Finance & insurance industry Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The NYSE outage has been pegged on gateways that were misconfigured for a software release, something that can be prevented with automation. Continue Reading
Companies in all industries can benefit from a master data management program, advises MDM expert Anne Marie Smith. Learn how to enhance yours. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading