Remove Big Data Remove Company Remove Malware Remove Mobile
article thumbnail

How TCS is helping to fight financial crime with AI and Microsoft Cloud

CIO Business Intelligence

Every new portal and mobile app expand the attack surface and give hackers new opportunities to exploit vulnerabilities. Challenges for fraud risk management Fraud is a big and a worthwhile business for today’s online criminals, who troll the internet and insert data-stealing malware into vulnerable sites and mobile apps.

Financial 105
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

Additionally, the company announced it acquired Sandboxie in an earlier 2013 transaction. “In June of 2013, we began shipping a solution powered by Invincea — Dell Data Protection | Protected Workspace — to provide our customers with advanced malware protection out of the box.

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Titans To Visit At Geoint: Here is my take on the must-see firms on the expo floor

CTOvision

Visiting Carahsoft is like visiting 150 companies at once. Also take time to learn about how auditing and data providence works. Through investment in time, intellectual capital and acquisition of a precisely selected set of very virtuous companies KEYW has built a company called Hexis Cyber.

Big Data 325
article thumbnail

Mobile Next? - A Screw's Loose

A Screw's Loose

Mobile Next? Lots of people are talking about what the next big thing is. It isn’t just in mobile either. People are asking the same question about Big Data, Cloud, and Networking. You see, your business strategy should be about how you create value for the company. Standard Disclaimer. A Screw's Loose.

Mobile 66
article thumbnail

Booz Allen Releases Annual Financial Services Cyber Trends for 2015

CTOvision

Companies are already aware of the potential cyber risks associated with partners, vendors and other third parties and are feeling more pressure from U.S. The use of tokenization, chip cards and other solutions will increasingly render stolen data useless to hackers. Cyber crime analysis evolves away from brute force to big data.

Financial 266
article thumbnail

Going Mobile - A Screw's Loose

A Screw's Loose

Going Mobile. What does it take to go mobile? I talk to a lot of people about mobility and I am invited to many webinars. We seemed to have moved away from what mobile really means and more towards “how we can sell you on our latest product as it supports BYOD”. So, mobility is about enabling your consumers.

Mobile 73
article thumbnail

Mobilizing the Enterprise - A Screw's Loose

A Screw's Loose

Mobilizing the Enterprise. I spend a lot of time talking to people about the mobile enterprise. Sometimes it’s people I work with, or friends who work at other companies, over twitter, or just people who reach out to ask a question or two about mobilizing their company. There has to be a reason to go mobile.

Mobile 60