| Similar Articles |
 |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up.  |
Insurance & Technology November 5, 2008 Jody Westby |
Building an Enterprise Security Program Key to Managing Risks Insurance companies are particularly vulnerable to cyber risks because they house so much sensitive data.  |
Insurance & Technology August 23, 2010 Peggy Bresnick Kendler |
Virtual Roundtable: How to Navigate Claims Transformation Industry experts discuss best practices for ensuring a successful claims system modernization project.  |
Bank Systems & Technology November 24, 2008 Peggy Bresnick Kendler |
Agiliance Launches RiskVision, IT Risk, Compliance Management Platform San Jose, Calif.-based Agiliance, a provider of governance, risk and compliance software solutions, has launched RiskVision 4.0, a risk and compliance management platform.  |
InternetNews June 6, 2005 Roy Mark |
Former Cyber Chief Raises 'Perfect Storm' Three former Bush administration top cyber security officials don't think the White House or the top levels of the private sector are putting enough priority on securing the nation's networks.  |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter.  |
| OCC Bulletin |
Weblinking The guidance offers risk management tools that would reduce risk to banks from linking arrangements and with third parties, especially reputation and compliance risks.  |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats.  |
InternetNews July 29, 2010 |
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks.  |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week.  |
Inc. April 2007 Dan Briody |
Full Coverage How to hedge your cyber risk with insurance.  |
Wall Street & Technology September 24, 2007 Melanie Rodier |
Large U.S. Firms Getting Better at Managing Risk, But Can Still Improve Large U.S. companies have improved their ability to identify and manage potentially critical business risks, but they still have a way to go, according to a study.  |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack.  |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users.  |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester.  |
Insurance & Technology May 18, 2004 Julie Gallagher |
IT Isn't Tapped for Compliance The insurance industry fails to embrace the full business value of IT when it comes to addressing regulatory requirements and instead relies primarily on manual processes and ad hoc measures  |
Insurance & Technology November 5, 2008 Drew Bartkiewicz |
Online Privacy Presents a Growing Liability Not enough companies are prepared for or insured against cyber liability, given the new reality that their business risk is so deeply tied to their mastery of IT and of the Internet itself.  |
Wall Street & Technology August 22, 2005 Larry Tabb |
Redefining Risk Compliance, continuity, and data and physical security will be the business and enterprise technology issues of the next decade or more.  |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks.  |
Insurance & Technology May 28, 2008 Nathan Conz |
Compliance Becoming Key Component of Core Systems As insurers strive to holistically align their compliance cultures with day-to-day operations, a similar trend is emerging strictly within the technology realm.  |
Insurance & Technology August 12, 2005 Peggy Bresnick Kendler |
The Compliance Challenge Industry experts offer opinions on what the biggest challenges carriers currently face in terms of regulatory compliance.  |
IndustryWeek June 17, 2009 Steve Minter |
Increase in Global Sourcing Expected Despite Supply Chain Risks Nearly two out of three financial executives expect global sourcing activities at their companies to increase during the next three years, a new study reports, even in the face of significant risks from extended supply chains.  |
Insurance & Technology May 25, 2010 Anthony O'Donnell |
HP Introduces Claims Correspondence Solution The HP Exstream solution, which supports critical front-office claims business processes, is designed to improve customer retention while reducing costs and compliance risks.  |
InternetNews February 10, 2006 Roy Mark |
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses.  |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally.  |
InternetNews December 8, 2004 Tim Gray |
Security Execs Identify Top Issues for 2005 Worms, viruses and regulatory compliance rank among the major worries.  |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation.  |
Search Engine Watch April 13, 2011 Jacob Morgan |
4 Steps for Evaluating Risk in Social Business A guide for organizations on how to understand and assess risks in the social business space.  |
Insurance & Technology March 16, 2004 Peggy Bresnick-Kendle |
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies.  |
Insurance & Technology February 9, 2004 Julie Gallagher |
No Rest for the Compliance Weary in 2004 Many insurance carriers are playing post-deadline compliance catch-up in 2004.  |
InternetNews April 14, 2010 |
Symantec Debuts New Enterprise Security Apps New security suites aim to better protect businesses' networks from evolving cyber threats.  |
InternetNews January 15, 2010 Larry Barrett |
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats.  |
InternetNews November 23, 2009 |
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds.  |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies.  |
InternetNews July 14, 2005 Roy Mark |
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing.  |
Financial Planning November 1, 2007 Mederic Daigneault |
Compliance Assessing risk: Begin by considering what services your financial advisory firm provides and to whom.  |
Registered Rep. August 15, 2014 Diana Britton |
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it.  |
Financial Planning October 1, 2012 |
Less-Risky Business: Protecting your Financial Planning Firm from Fraud Deena Katz tells financial advisors 5 easy steps to protect your firm from fraud and software vulnerabilities  |
Investment Advisor August 2006 Thomas D. Giachett |
Expert's Corner: A Process, Not a Destination With the advent of SEC Rule 206(4) 7, which requires SEC-registered investment advisors to implement and maintain policies and procedures appropriate for their investment advisory business, it is more critical than ever for all RIAs to recognize that compliance is an ongoing process.  |
PC Magazine April 5, 2006 Robert Lemos |
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user.  |
InternetNews March 5, 2010 |
FBI Director Seeks Industry Help on Cybersecurity In an address at the annual RSA show, FBI Director Robert Mueller outlines challenges the agency has in fighting cyber crime, seeks broader partnerships with private-sector firms.  |
Bank Technology News October 2008 Kyle Duckers |
Strategic GRC Yields Clear Payback Can a financial institution's governance, risk and compliance effort be a strategic tool, or is it simply a cost of doing business? Can best practices actually improve shareholder value? These are important questions that some financial services executives continue to ponder.  |
Bank Technology News January 2006 |
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business.  |
The Motley Fool January 25, 2011 Bryan Hinmon |
Protect Your Portfolio From Cyber Threats Defend your portfolio from The Attack of the Killer e-Tomatoes.  |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data.  |
Insurance & Technology February 5, 2010 Anthony O'Donnell |
IVANS: P&C Insurers Prioritize Retention, Compliance and Operational Transformation in 2010 IT Spend Facing a negative outlook, insurance carriers are investing in IT to shore up their customer base, prepare for an evolving regulatory compliance regime, find customer retention, and find new sources of efficiency.  |
Bank Systems & Technology December 29, 2009 Henry Ristuccia |
Washington's Regulatory Agenda Will Shape Banks' Risk IT Strategies Now is the time to examine governance, risk and regulatory compliance processes and to get your house in order so that your bank can be ahead of any requirements that may be enacted.  |
CRM July 6, 2012 Otavio Freire |
Enabling Social Collaboration with Social Compliance Monitoring, tracking, and reporting for risk management.  |
OCC Bulletin May 10, 2004 |
Risk Management of New, Expanded, or Modified Bank Products and Services The risk management principles in this bulletin outline the expectations of the Office of the Comptroller of the Currency and apply to the introduction of traditional and non-traditional bank products and services, as well as modifications to existing products and services.  |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said.  |