January 2008 | Archive by Month | SearchFinancialSecurity.com

January 2008

  • RASHport (Routing and Special Handling)

    RASHport, also called RASH (Routing and Special Handling), is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations)...

  • OUCH protocol

    OUCH is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market... (Continued)

  • FIX protocol (Financial Information Exchange protocol)

    The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry... (Continued)

  • QIX (NASDAQ Information Exchange protocol)

    QIX (NASDAQ Information Exchange protocol) is a proprietary specification intended to streamline automated trading in the financial industry... (Continued)

  • Securities and Exchange Commission (SEC)

    The Securities and Exchange Commission (SEC) is a U.S. government agency that oversees securities transactions, activities of financial professionals and mutual fund trading to prevent fraud and in...

  • FACTA (Fair and Accurate Credit Transactions Act)

    FACTA (Fair and Accurate Credit Transactions Act) is an amendment to FCRA (Fair Credit Reporting Act ) that was added, primarily, to protect consumers from identity theft... (Continued)

  • FCRA (Fair Credit Reporting Act)

    FCRA (Fair Credit Reporting Act) is a United States Law that regulates how consumer credit information is collected, used and shared... (Continued)

  • GLBA's focus on data security has helped financial services, say industry observers

    While few financial services organizations enjoy the work that comes with ensuring its security measures are compliant with the Gramm-Leach-Bliley Act, experts and industry observers say there's no...

  • HIPAA: Clean bill of health, or dying a slow death?

    HIPAA has changed the way a lot of healthcare companies handle data, but the fact that no one has been fined or jailed for non-compliance makes one wonder if they'll keep up with it.

  • Missing backup tape prompts identity theft fears for JC Penney customers

    The personal information of about 650,000 customers was put at risk after a backup tape, stored at a warehouse run by Iron Mountain Inc., disappeared.

  • Encryption best practices

    Encryption is a necessary security tool in financial companies, but government mandates limit how much data you can encrypt and where it can be deployed. Learn how to determine what's the best plan...

  • Deploying secure wireless LANs

    Wireless networks have taken a beating in the financial world since it was discovered that the massive TJX data breach was enabled by an insecure Wi-Fi network. But there is a way to deploy WLANs s...

  • Secure Electronic Transaction (SET)

    Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.

  • SAML (Security Assertion Markup Language)

    SAML (Security Assertion Markup Language) is an Extensible Markup Language (XML) standard that allows a user to log on once for affiliated but separate Web sites.

  • mutual authentication

    Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other... (Continued)

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) is a list of standard terms referring to security-related threats... (Continued)

  • subpoena

    A subpoena is a command issued by a court in which a person or corporation is required to physically appear before, or produce specific evidence to, that court... (Continued)

  • virtual asset

    A virtual asset is a representation of currency in some environment or situation, such as a video game or a financial trading simulation exercise... (Continued)

  • corporate governance

    Corporate governance is a term that refers broadly to the rules, processes, or laws by which businesses are operated, regulated, and controlled...

  • CISP-PCI (Cardholder Information Security Program - Payment Card Industry Data Security Standard)

    CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and ...