The Cyber Stick-Up – Making Sure Your Endpoints are ProtectedMarch 22, 2013Today’s cybercriminals are much more effective than the masked robber holding up a teller; they’re very good at finding and exploiting an organization’s weakness and often even better at being able to get in and out of a computer network
7 Big Data Players To WatchMarch 05, 2013New York City, IBM, State Street and four other organizations are developing innovative ways to leverage the ever-increasing volumes of data they're amassing.
RIM to Rename Itself BlackBerryJanuary 30, 2013Research In Motion Ltd
is changing its name to BlackBerry, the company
announced on Wednesday, in move to refresh its tarnished image
as it begins marketing a reengineered line of BlackBerry 10
The Cybersecurity Imperative: How Banks Can Combat CybercrimeSeptember 04, 2012As the financial world gets increasingly high-tech, protecting data has never been more important. According to BITS president Paul Smocer, innovations such as smartphones and cloud computing offer banks great opportunities for efficiency and customer enga
Q&A: Security Pros Identify Key Themes at the NICE Actimize ForumOctober 18, 2011Shawn Swartout, VP and security director at Spokane, Wash.-based Sterling Savings Bank and Ben Knieff, director of product marketing and enterprise fraud prevention expert at NICE Actimize say that managing customer relationships is key to a successful sec