Category:

Online Security

The Unforeseen Risk of Shared Services DDoS

Reported by | Updated: January 21, 2016

A Distributed Denial-of-Service (DDoS) attack targeted at one website is bad enough. But what happens when that single attack possesses the distinct possibility of doing even more damage than originally intended. The kind of collateral damage is very real when you take into account IT architectures reliant on shared services.

Managing Profitable Online Growth- by curbing online Frauds

Reported by | Updated: January 21, 2016

The dual effect of a slow global economic recovery combined with increased regulatory and compliance burden are causing banks to be watchful about every rupee they spend or invest. Despite these barriers, banks are expected to grow consistently in terms of revenue, market share and profits and at the same time adhere to regulations and […]

Cyber Heists- Forever Here?

Reported by | Updated: October 3, 2013

Some time back, AGM of UCO bank lodged a complaint stating that about Rs 75,000 was illegally transferred to some other account. Recently, a doctor fell prey to phishing scam, and lost Rs 1.4 lakh. Cybercriminals had siphoned off Rs. 1.4 lakh from four bank accounts of a physiotherapist after tricking him into revealing his […]

Managing Profitable Online Growth- by curbing online Frauds

Reported by | Updated: September 27, 2013

The dual effect of a slow global economic recovery combined with increased regulatory and compliance burden are causing banks to be watchful about every rupee they spend or invest. Despite these barriers, banks are expected to grow consistently in terms of revenue, market share and profits and at the same time adhere to regulations and […]

The Unforeseen Risk of Shared Services DDoS

Reported by | Updated: September 19, 2013

Rich Bolstridge Chief Strategist, Financial Services, Akamai Technologies A Distributed Denial-of-Service (DDoS) attack targeted at one website is bad enough. But what happens when that single attack possesses the distinct possibility of doing even more damage than originally intended. The kind of collateral damage is very real when you take into account IT architectures reliant […]