FSTC Reports

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

The CFOs Guide to Digital Finance Transformation
sponsored by ServiceNow
EGUIDE: Looking for a crash-course on digital finance transformation? Inside, glean insight into the changing world of finance with information tailored specifically to the needs of industry CFOs. Review the main causes for digital finance transformation, and learn what digital transformation in finance can do for your organization.
Posted: 12 Sep 2019 | Published: 10 Sep 2019

ServiceNow

Using Creativity and Data Analytics to Drive Corporate Strategy
sponsored by Concur Technologies
EGUIDE: This expert e-guide explores why creativity is becoming a critical skill for finance professionals, and offers key recommendations from a leading CFO to help you successfully move forward.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Concur Technologies

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

LogRhythm, Inc.

Financial Firms: Successfully Embracing the Workflow Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: The following white paper entails exactly what the workflow transformation is as well as expert advice from leading organizations on how to improve upon the integral areas of financial firms.
Posted: 29 Oct 2013 | Published: 29 Oct 2013

Hewlett-Packard Enterprise

Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.
Posted: 22 Jul 2010 | Published: 22 Jul 2010

Micro Focus, Ltd

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
sponsored by IBM
WHITE PAPER: This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM