Securing SWIFT, no not Taylor...
Here is an excellent, detailed evaluation and recommendation about the recent Bangladeshi SWIFT breach. Good reading for security interested folks on how to secure important systems more generally too.
Here is an excellent, detailed evaluation and recommendation about the recent Bangladeshi SWIFT breach. Good reading for security interested folks on how to secure important systems more generally too.
Strengthen businesses' financial performance through outsourcing services in F&A and Automation | FP&A | Business Analysis | Design processes to optimize use of Technology.
10 个月Art, thanks for sharing!
Passionate Technology Leader
8 年Great article, it is not just only swift, There are several legacy applications that needs a wrapper to secure. While it is difficult process to change some of the culture of large organization... Doug's point are quite relevant to secure most vulnerable points of entry..