article thumbnail

Embracing new ways of working in financial services

CGI

Embracing new ways of working in financial services. In times of crisis, the preservation of key functions and services is critical, regardless of industry. Financial services is no exception, as payments, lending, and trade are the lifeblood of the global economy, even in challenging times.

article thumbnail

[Podcast] Titans of Technology Innovation

AIIM

Many can remember having to go to their local video store to rent a movie. You'll hear about Crawford Technologies and how they helped a financial services company design, implement, and issue documents in accessible PDF format to their blind, partially sighted, and cognitively disabled customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Exploring the New Norm of IIM in State and Local Government

AIIM

In addition to stacks and stacks of scanned files, and a confluence of different types of electronic files, the inclusion of audio and video records are becoming more and more common. More and more records managers in state and local government operations tell me that their job is changing.

ECM 124
article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

Check out our video to learn more about IBM’s new Madrid MZR Additionally, we continue to co-create with clients and partners globally—such as BNP Paribas, Wasabi Technologies, SAP and VMware—and across industries to unlock business value with a hybrid cloud approach.

article thumbnail

Akamai Talks Massive Uptick in Credential-Stuffing Attacks Against Bank APIs

Threatpost

Researchers with Akamai say that 75 percent of all credential abuse attacks against the financial services industry were targeting APIs.

article thumbnail

LPE zero-day flaw in Razer Synapse allows attackers to take over Windows PCs

Security Affairs

Razer is a very popular computer peripherals manufacturer that designs, develops, and sells consumer electronics, financial services, and gaming hardware, including gaming mouses and keyboards. Once gained SYSTEM privileges in Windows, attackers can completely take over the system.

article thumbnail

Exclusive: Researchers dumped Gigabytes of data from Agent Tesla C2Cs

Security Affairs

The majority of intercepted credentials by Agent Tesla related to financial services, online-retailers, e-government systems and personal and business e-mail accounts. . Researchers found active instances of Agent Tesla and developed a mechanism to enumerate the affected clients and extract compromised data.