This website uses cookies. By navigating around this site you consent to cookies being stored on your machine

Blog

  • Flushing out the fraudsters during floods

    Monday 01 February 2016

    Flushing out the fraudsters during floods

    Insurers have a duty to pay claims fast and readily, and to protect their customers in a time of need. However by so doing, they open up their cheque books to those who see this misfortune of others as an opportunity for themselves.

    Financial Crime

    Blog
    Financial Crime
  • Time to look in the mirror

    Thursday 28 January 2016

    Privacy: Time to look in the mirror?

    When considering Data Privacy, traditionally we round upon cyber criminals, unscrupulous mass marketers and other faceless data harvesters as the enemies of privacy whilst ignoring the most common privacy threat: The “enemy” within.

    Digital Transformation

    Blog
    Digital Transformation
  • Finding the needle in a needlestack

    Monday 25 January 2016

    Finding the needle in a needlestack

    The exponential growth in the number, frequency and complexity of cyber attacks makes it harder to detect every attack. Find out how defenders must combine technology automation and human intuition to counter the threat.

    Cyber Security, Financial Crime

    Blog
    Cyber SecurityFinancial Crime
  • The continuing evolution of financial crime technology

    Monday 18 January 2016

    The continuing evolution of financial crime technology

    The need for continuous improvement and an upsurge in fraudulent activities drive professionals to seek better solutions and each year evaluate copious new technologies that promise to solve all related issues.

    Financial Crime

    Blog
    Financial Crime
  • Testing your defences against SQL injection

    Wednesday 13 January 2016

    Testing your defences against SQL injection

    So-called SQL injection (SQLi) attacks can be used to delete, modify or retrieve information from the database, and even execute commands on the underlying operating system. Discover how to prevent SQLi on your network.

    Security Research

    Blog
    Security Research
  • Evolution of the CISO

    Monday 04 January 2016

    Evolution of the CISO

    Jim Anderson, President of the Americas, BAE Systems Applied Intelligence, provides his perspective on how the role of the Chief Information Security Officer (CISO) is evolving in the face of increasing frequency and severity of cyber threats.

    Cyber Security

    Blog
    Cyber Security
  • Holiday Security

    Thursday 03 December 2015

    Security in the holiday season

    For many employees, the approaching holiday season means Christmas parties, social gatherings, and spending more time out of the office than usual. It also means fewer people are paying attention to office, device, and online security.

    Cyber Security

    Blog
    Cyber Security
  • Cryptolocker

    Wednesday 02 December 2015

    A Bumper Harvest - Cryptolocker Address Book Theft

    Attackers use social engineering to exploit trust. An end user is more likely to open a malicious attachment or click a link if it appears to come from a trusted source...

    Security Research

    Blog
    Security Research
  • Trends in the Cyber Security Marketplace

    Sunday 29 November 2015

    Trends in the Cyber Security Marketplace

    Jim Anderson, President of the Americas, BAE Systems, talks about the trends that we can see in the cyber security marketplace

    Cyber Security

    Blog
    Cyber Security
  • Surviving Black Friday

    Thursday 26 November 2015

    Surviving Black Friday: (And Avoiding a 'Cyber Monday') Be Prepared, And Don't Forget Security

    As another Black Friday kicks off the festive shopping frenzy, online retailers wishing to reap the benefits need to be prepared for the huge surge in traffic on their shopping sites.

    Digital Transformation

    Blog
    Digital Transformation