The number of laptop, smartphone, tablet and phablet owners who regularly use their gadgets for mobile banking is rising rapidly, according to a recent report. But the numbers don’t add up, writes CIO.com's Al Sacco.
BrandPostSponsored by Sungard Availability Services
Criminal and terrorist organizations are increasingly relying on international trade to hide the flow of illicit funds across borders. Big data analytics may be the key to tracking these financial flows.
Since it’s called BYOD, bring your own device, you might think it’s all about, well, the device. Think again. The impact of BYOD on corporate networks and data security is profound. For a thorough, yet succinct exploration of this
Soltra Edge is a free, standards-based communications network that connects public and private cyberthreat intelligence providers with enterprise security technology platforms that can put this information to use
Web application firewalls protect data and applications against online threats. Because Web application firewalls are strategic, every organization must carefully evaluate their security, management, and deployment capabilities.
There is an increase in use of complex crimeware that gathers the passwords of online customers at specific banks and automatically transfer funds out of their accounts, according to Akamai’s security group.
Fidelity Investments today announced a cutting edge way for customers to check on the health of their investments – by donning 3D goggles and peering around a personalized city where the size of each building relates the health of...