article thumbnail

Axio Joins with Cyber Risk Institute to Deliver Cybersecurity Resilience to Financial Services Institutions Across the Globe

CyberSecurity Insiders

Together, Axio and CRI’s combined talents will deliver the CRI Cyber Profile tool to CRI members and other interested financial institutions with the Axio360 platform. The CRI Profile is the benchmark for cyber security and resiliency in the financial services industry. Learn more at [link].

article thumbnail

BrandPost: Mercury Financial gains a competitive advantage with zero trust

CSO Magazine

A born-in-the-cloud company, Mercury Financial upholds a competitive advantage in the financial services industry through advanced technology tools that help its customers responsibly manage their credit and offer them credit as they’ve never had before. To read this article in full, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CFPB’s Proposed Data Rules

Schneier on Security

The rules would ensure people can obtain their own financial data at no cost, control who it’s shared with and choose who they do business with in the financial industry. The best way for financial services firms to meet the CFPB’s rules would be to apply the decoupling principle broadly.

Banking 248
article thumbnail

Tackling DORA Compliance With a Focus on PAM

IT Security Guru

The Digital Operational Resilience Act (Regulation (EU) 2022/2554) was born from a realisation that businesses, particularly those in financial services, rely increasingly on Information and Communications Technology (ICT) and digital means to operate. DORA takes effect in January 2025.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

Security & Compliance for SAP Data in Financial Services. Financial services companies keep some of their most valuable data in SAP applications, triggering the need for both additional security and taking steps toward meeting compliance requirements. The need increases as they move workloads to the cloud.

article thumbnail

How to make sure your digital transformation is secure

CyberSecurity Insiders

However, their integration raises new challenges around security, privacy and the reliability of underlying systems that a business utilises, which, in turn, requires the support of strong cybersecurity architecture. Untapped potential. So how can organisations carry out a digital transformation while ensuring sensitive data is protected?

article thumbnail

Go-based Chaos malware is rapidly growing targeting Windows, Linux and more

Security Affairs

Researchers from Black Lotus Labs at Lumen Technologies, recently uncovered a multifunctional Go-based malware that was developed to target devices based on multiple architectures, including Windows and Linux. A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn.

Malware 91