Investment Services Industry Reports

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

Innovation Awards APAC 2023 - Financial Services: DBS Bank
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about DBS Technology Marketplace and how it delivers anything-as-a-service (XaaS) capabilities that enable the bank's applications teams to adapt cloud-native applications quickly and efficiently.
Posted: 20 May 2023 | Published: 21 May 2023

TechTarget ComputerWeekly.com

CW Europe: December 2016 - February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 08 Feb 2021 | Published: 15 Dec 2016

TechTarget ComputerWeekly.com

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

CIO Trends #11: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Nordic region is a place where people aren't afraid to try out the latest digital technologies. In banking for example, the region is leading the way in the age of open banking. Read here why this might be the case. But it goes way beyond the technology itself and has a lot to do with the attitude to change in the region.
Posted: 08 Feb 2021 | Published: 02 Jul 2020

TechTarget ComputerWeekly.com

Fintech : Meet ten financial services disruptors - Part Two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Smarter Lending: Returns come quickly when you increase agility, make better decisions and delight customers
sponsored by IBM
WHITE PAPER: This white paper explores the challenges modern financial institutions face when seeking to implement a smart lending strategy. Inside, learn about the unique methods and approaches available to help overcome these hurdles.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

IBM

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

IBM Systems Solution for Branch Banking: Installation Guide
sponsored by VMware and IBM
BOOK: This IBM Redbook discusses how to install and configure the components of the Systems Solution for Branch Banking, a hardware and software solution that enables banks to provide a common, easy-to-support IT infrastructure in their branc...
Posted: 04 Jun 2007 | Published: 01 Feb 2007

VMware and IBM

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.