Banking & Finance — Opinions

Business Applications as a Service (BAaaS)

The rise and rise of the as-a-Service (XaaS) model continues. The various models based around the XaaS approach are all forecast to continue growing rapidly as organizations go on taking advantage of the increased flexibility, lower CAPEX (Capital Expenditure) and on-demand nature of the service. Gartner predicts that Infrastructure-as-a-Service (IaaS) will grow at a CAGR (Compound annual Growth Rate of 41.3 per cent through 2016, while Platform-as-a-Service (PaaS) will hit 27.7 per cent CAGR in the same period. The Software-as-a-Service (SaaS) market will grow at 19.5 per cent CAGR in that time too, demonstrating how significant the cloud delivery of IT services has become.

Gordon Makryllos | 01 Dec | Read more

Proactive Infosec

Are our investments in ‘information security’ aligned with today’s reality? It seems that every day there is a new security incident making headlines. Dictionary.com has nominated the word ‘exposure’ as word of the year. The word exposure has been popularised by events such as Ebola, but more relevant to us in the world of ‘infosec’, data breaches and other related security incidents.

John Ellis | 01 Dec | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

Cyber crime in financial institutions

What is cyber crime? There are a number of different ways that criminals are trying to target financial institutions. There is social engineering exploits, which is when an end-user gets an email claiming to be from their bank, but it’s really a cyber criminal. Within that email there is a link asking the end-user to confirm their account information. Cyber criminals then leverage the credentials to gain access to the user’s financial records and banking accounts. Malware is another piece to it, where criminals distribute malicious software and a user is tricked into installing a keylogger or screen scraper program on their device. This means that when an end-user enters their credentials, the program can capture all that information, allowing criminals to gain access to the account.

Crispin Kerr | 03 Oct | Read more

Opinion: How safe is your customer identity data?

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

Anton Koren | 14 Jul | Read more

Editor's Recommendations

Solution Centres

Brand Page

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release