Remove 2007 Remove Cybersecurity Remove Financial Services Remove Security
article thumbnail

Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima

The Security Ledger

Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Read the whole entry. »

article thumbnail

Summary – “Industry in One: Financial Services”

ARMA International

The scope of a records and information management (RIM) program in financial services can seem overwhelming. Compared to other industries, the complexities of managing records and information in financial services are arguably some of the toughest to solve, primarily because of the intense regulatory scrutiny.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Since the inception of data forensics almost forty years ago, methods for investigating security events have given way to a market of vendors and tools offering digital forensics software (DFS). Under their Security Suite products, OpenText provides industry-renowned EnCase. Volatility.

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

With almost every aspect of business becoming more digital, enterprise network security software minimizes the impact of cyberattacks — especially as guarding against them protects a company’s operations and safeguards its competitiveness in a fast-moving marketplace. Top network security tools. Network Security Product.

Security 117
article thumbnail

Senators Introduce Cybersecurity Act of 2012

Hunton Privacy

congressional committee, including Senators Joseph Lieberman (I-CT), Susan Collins (R-ME), Jay Rockefeller (D-WV) and Dianne Feinstein (D-CA), introduced the Cybersecurity Act of 2012 (the “Act”). On February 14, 2012, a joint U.S. The Act has several key components. However, in his February 16 testimony to the U.S.

article thumbnail

MY TAKE: Here’s how ‘bulletproof proxies’ help criminals put compromised IoT devices to work

The Last Watchdog

namely smart refrigerators, garage doors, home routers and the like – nearly quadrupled for the retail and financial services sectors. This stunning intel comes in a study from Cequence Security , a Sunnyvale, CA-based vendor focused on helping companies defend against such attacks. Talk more soon.

IoT 153