Browse Definitions:

SearchFinancialSecurity

SearchFinancialSecurity.com is the only security-specific information resource that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost. Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with ensuring security in high-risk financial environments.

View the complete archive of Financial Security and Compliance news, research and expert advice.

Go to:  SearchFinancialSecurity

Recently on  SearchFinancialSecurity

2017 (ISC)² Security Congress

(ISC)² Security Congress is being held in Austin, TX at the JW Marriott Austin from September 25 - 27.

More Highlights
Definitions
  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

Browse Financial Security Topics

Business process security

The business process security topics page provides financial industry IT security professionals with up-to-date information and resources on financial transaction protocols and security, debit and credit card fraud prevention, logical and physical security convergence, and business partner and vendor security issues. Get guidelines for integrating and building security into the day-to-day processes of financial organizations.

Recent Definitions

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure and all copies are updated simultaneously.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the digital leger replaces current monetary systems.

  • card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).

Highlights

More Business process security Topics

Back to Top

Information security management

Our financial services security technology topics page provides financial industry IT security professionals with up-to-date information and resources on ID management and access control; network security; online, Web and application security; and secure communications. Browse the financial services security technology subtopics below and discover the latest news, expert advice, tips, resources and white papers on managing user identities and controlling access.

Recent Definitions

  • digital currency

    A digital currency is a medium of exchange that is generated, stored and transferred electronically.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the digital leger replaces current monetary systems.

  • four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all levels and in a wide variety of environments. The four eyes principle is sometimes called the two-man rule or the two-person rule.

Highlights

More Information security management Topics

Back to Top

Regulations and compliance

Compliance is a major painpoint for the financial services industry. Just keeping track of the federal and state legislation, as well as legislation for the financial and banking industries can be a drain on your resources. Learn about financial services laws, such as FACTA, FFIEC and PCI DSS, SOX and HIPAA, and get best practices for complying with federal and international laws and regulations, such as Basel II.

Recent Definitions

  • insurance claims analysis

    Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.

Highlights

More Regulations and compliance Topics

Back to Top

Security strategies

The financial services security management strategies topics page provides up-to-date information and resources on data governance, threat prevention, risk assessment and disaster recovery planning. These security management strategies are perfect for CSOs, CISOs and other financial services executives and decision makers.

Recent Definitions

  • card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).

  • four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all levels and in a wide variety of environments. The four eyes principle is sometimes called the two-man rule or the two-person rule.

  • Automated Clearing House fraud (ACH fraud)

    ACH fraud is the theft of funds through the Automated Clearing House financial transaction network. The ACH network acts as the central clearing facility for all Electronic Fund Transfer (EFT) transactions in the United States, representing a crucial link in the national banking system.

Highlights

More Security strategies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close