article thumbnail

Banking on mainframe-led digital transformation for financial services

IBM Big Data Hub

Financial services companies are considered institutions because they manage and move the core aspects of our global economic system. And the beating heart of financial institutions is the IBM mainframe. Couldn’t execs have run better analyses to spot risks within the data? No more mucking with green screens here.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

Approov recently did a deep dive study of 650 financial services mobile apps of financial institutions across Europe and the US. Until API security generally gains a lot more ground, and next gen solutions achieve critical mass, the risk level will remain high. So be careful out there.

article thumbnail

Building for operational resilience in the age of AI and hybrid cloud

IBM Big Data Hub

Organizations in the financial services, healthcare and other regulated sectors must place an even greater focus on managing risk—not only to meet compliance requirements, but also to maintain customer confidence and trust. Similarly, in the U.S.

Cloud 73
article thumbnail

Deploying applications built in external CI through IBM Cloud DevSecOps

IBM Big Data Hub

Cyber risk is preeminent in today’s threat landscape, and that includes attacks on the software supply chain. These are referred to as supply chain risks, and they include vulnerable code that may be included from open source or third parties. cocoa inventory add : Adds an artifact to the inventory repository.

Cloud 73
article thumbnail

Recycle Your Phone, Sure, But Maybe Not Your Number

Krebs on Security

New research shows how fraudsters can abuse wireless provider websites to identify available, recycled mobile numbers that allow password resets at a range of email providers and financial services online. Such services are already offered by companies like NumberBarn and Park My Phone , and they generally cost between $2-5 per month.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

Trends in Cloud Security: Key Findings from the 2022 Cloud Security Study. This webinar presents key findings from the 2022 Thales Cloud Security Study. Security & Compliance for SAP Data in Financial Services. SAP and Thales have worked together to solve these challenges for financial services customers.