Browse Definitions:

SearchFinancialSecurity

SearchFinancialSecurity.com is the only security-specific information resource that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost. Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with ensuring security in high-risk financial environments.

View the complete archive of Financial Security and Compliance news, research and expert advice.

Go to:  SearchFinancialSecurity

Recently on  SearchFinancialSecurity

(ISC)² Security Congress 2018

(ISC)²'s Security Congress will bring cybersecurity professionals together from around the world for three days of education and thought-leadership sessions, best-practice sharing and networking.

More Highlights
Definitions
  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

Browse Financial Security Topics

Business process security

The business process security topics page provides financial industry IT security professionals with up-to-date information and resources on financial transaction protocols and security, debit and credit card fraud prevention, logical and physical security convergence, and business partner and vendor security issues. Get guidelines for integrating and building security into the day-to-day processes of financial organizations.

Recent Definitions

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

  • SAML (Security Assertion Markup Language)

    The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure and all copies are updated simultaneously.

Highlights

More Business process security Topics

Back to Top

Information security management

Our financial services security technology topics page provides financial industry IT security professionals with up-to-date information and resources on ID management and access control; network security; online, Web and application security; and secure communications. Browse the financial services security technology subtopics below and discover the latest news, expert advice, tips, resources and white papers on managing user identities and controlling access.

Recent Definitions

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

  • Ripple

    Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.

  • digital currency

    A digital currency is a medium of exchange that is generated, stored and transferred electronically.

Highlights

More Information security management Topics

Back to Top

Regulations and compliance

Compliance is a major painpoint for the financial services industry. Just keeping track of the federal and state legislation, as well as legislation for the financial and banking industries can be a drain on your resources. Learn about financial services laws, such as FACTA, FFIEC and PCI DSS, SOX and HIPAA, and get best practices for complying with federal and international laws and regulations, such as Basel II.

Recent Definitions

  • insurance claims analysis

    Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.

Highlights

More Regulations and compliance Topics

Back to Top

Security strategies

The financial services security management strategies topics page provides up-to-date information and resources on data governance, threat prevention, risk assessment and disaster recovery planning. These security management strategies are perfect for CSOs, CISOs and other financial services executives and decision makers.

Recent Definitions

  • reinsurance

    Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.

  • card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).

  • four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all levels and in a wide variety of environments. The four eyes principle is sometimes called the two-man rule or the two-person rule.

Highlights

More Security strategies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close