CybersecurityRSS

IBM promise in the cloud threatens to become false dawn

IBM working with Standard Life and ING Direct Australia

IBM has reported a mixed bag of results for the first quarter of 2017, with the strategic imperatives offerings up but overall revenues down 2% to $18.2 billion, reports Telecoms.com (Banking Technology‘s sister publication). While another quarter of decline is nothing new to report for Big Blue, what might be worrying for the team is […]

Four best practices in responding to a security breach

cyberecurity

You need to tell your customers you’ve been hacked. Now what?

AI is the only option in the future of cyber security – Ericsson

cyberecurity

The cybersecurity wars of the future will be fought by good artificial intelligence (AI) bots and bad ones, with the rest of us just watching to see who wins.

Swift calling time on cybercrime with new payment controls

New addition to Swift's network

Swift has unveiled a new real-time payment controls service to add to its customers’ existing fraud controls. The new fraud and cybercrime prevention service will enable its customers to screen their payment messages according to their own chosen parameters, “enabling them to immediately detect any unusual message flows before transmission”. Yawar Shah, chairman of Swift, […]

Woes for Wonga with data breach

UK-based payday loan company Wonga says there may have been illegal and unauthorised access to the personal data of some of its 270,000 customers. In a statement, the firm says information stolen may have included one or more of the following: name, e-mail address, home address, phone number, the last four digits of a card […]

Tackling cybercrime: why the industry must unite

Cybercrime

Cyberattacks have been dominating newspaper headlines for some time now. Whether it’s losing access to PayPal, a distributed denial of service attack on Lloyds Group, or Tesco Bank customers losing £2.5 million to hackers, the threat of a cyberattack in 2017 is so great that it’s not a case of if, but when one occurs.

Protecting porous perimeters via identity access management

Identity access management

With the growth of “mobile working” and an increasing number of business applications migrating to the cloud, the corporate perimeter has become more porous and vulnerable, driving demand for solutions that manage access and user identities securely and efficiently. This is where identity access management (IAM) technologies come into play. ING’s Sicco Boomsma explores.

A vaccination for financial crime

Vaccination

ransaction monitoring is emerging as one of the top priorities for banks and other financial institutions. Some now employ up to three per cent of their workforce to track financial crime. But, as leadership teams look to increase the effectiveness of their processes in the face of regulatory scrutiny and reduce costs, are there lessons to be learnt from health industry and its battle against infectious diseases?

SIX picks IBM Watson for cybercrime fight

Switzerland

SIX Securities Services, Switzerland’s post-trade market infrastructure, will use IBM Watson for its new cognitive security operations centre (SOC). The new facility will be housed at SIX’s offices in Switzerland to provide localised cybersecurity services “tailored to the needs of the region”. Robert Bornträger, division CEO SIX global IT, says IBM is a “logical partner” […]

Deutsche Bank opens innovation lab in New York

deutsche bank

Deutsche Bank has opened an innovation lab in New York, its fourth globally. The lab is part of its five-year plan for €1 billion investment in digital initiatives. It is sited in Lower Manhattan’s Fulton Center and will explore new technologies focused on several areas, including artificial intelligence, cloud technology and cybersecurity. Elly Hardwick, head […]

@banking
techno