Browse Definitions :

SearchFinancialSecurity

SearchFinancialSecurity.com is the only security-specific information resource that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost. Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with ensuring security in high-risk financial environments.

View the complete archive of Financial Security and Compliance news, research and expert advice.

Go to:  SearchFinancialSecurity

Recently on  SearchFinancialSecurity

(ISC)² Security Congress 2018

(ISC)²'s Security Congress will bring cybersecurity professionals together from around the world for three days of education and thought-leadership sessions, best-practice sharing and networking.

More Highlights
Definitions
  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

Browse Financial Security Topics

Business process security

The business process security topics page provides financial industry IT security professionals with up-to-date information and resources on financial transaction protocols and security, debit and credit card fraud prevention, logical and physical security convergence, and business partner and vendor security issues. Get guidelines for integrating and building security into the day-to-day processes of financial organizations.

Recent Definitions

  • e-commerce (electronic commerce or EC)

    E-commerce -- electronic commerce or EC -- is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

  • SAML (Security Assertion Markup Language)

    The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.

Highlights

More Business process security Topics

Back to Top

Information security management

Our financial services security technology topics page provides financial industry IT security professionals with up-to-date information and resources on ID management and access control; network security; online, Web and application security; and secure communications. Browse the financial services security technology subtopics below and discover the latest news, expert advice, tips, resources and white papers on managing user identities and controlling access.

Recent Definitions

  • Bitcoin ATM

    A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

  • Ripple

    Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.

Highlights

More Information security management Topics

Back to Top

Regulations and compliance

Compliance is a major painpoint for the financial services industry. Just keeping track of the federal and state legislation, as well as legislation for the financial and banking industries can be a drain on your resources. Learn about financial services laws, such as FACTA, FFIEC and PCI DSS, SOX and HIPAA, and get best practices for complying with federal and international laws and regulations, such as Basel II.

Recent Definitions

  • insurance claims analysis

    Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.

Highlights

More Regulations and compliance Topics

Back to Top

Security strategies

The financial services security management strategies topics page provides up-to-date information and resources on data governance, threat prevention, risk assessment and disaster recovery planning. These security management strategies are perfect for CSOs, CISOs and other financial services executives and decision makers.

Recent Definitions

  • reinsurance

    Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.

  • card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).

  • four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all levels and in a wide variety of environments. The four eyes principle is sometimes called the two-man rule or the two-person rule.

Highlights

More Security strategies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close