Resources

Case Study

Major Banking Institution Case Study

This multinational banking institution has been around for over 100 years, dedicated to helping a customer base of over 20 million people in countries all over the world.In order to serve such a large customer base and keep financial services at competitive rates, they’ve taken advantage of the latest in cloud technology to reduce the operating costs of their IT infrastructure and outward-facing...
Case Study

Two Large Financial Services Organizations

To remain competitive, organizations must be able to quickly adapt to support volatile business demands. For IT organizations, the unprecedented speed that images can be deployed into the cloud also brings complexity. Until the initial baseline of an image is captured, there is the potential for unauthorized modifications to pass undetected. Even without malicious intent, a seemingly insignificant...
Case Study

Major Healthcare Provider Enhances Vulnerability Management Program

Recognized as one of the top healthcare providers in the United States, this organization employs tens of thousands of professionals spread across nearly 500 locations. The provider wins frequent awards for the quality of its services and is regularly recognized for being among one of the highest-rated workplaces in the industry. To further elevate the level of security around the vast volumes of...
Case Study

Healthcare Provider Achieves Epic System Integrity for Compliance and Security

This major hospital system in the Midwest region of the United States, ranked among the top 100 hospitals in the nation and top 10 for delivering integrated healthcare, provides comprehensive medical and trauma services and embraces innovative technologies like electronic health record (EHR) systems from Epic to deliver optimal patient care and achieve efficiencies. The hospital also manages Epic...
Case Study

Leading Nationwide Provider of FDIC-Insured Financial Services

This nationally recognized financial solutions provider offers a set of services that enable smaller banks and other related institutions to compete with the industry’s dominant players. The company’s portfolio of FDIC-insured solutions enables its members and other key constituents to offer innovative services that otherwise might be too difficult or too costly to provide on their own.Continuous...
Case Study

Chi-X Australia Australian Equity Trading Exchange Operator

As a self-described “innovator,” Sydney-based Chi-X Australia is turning the Australiansecurities market landscape on its head. For the first time ever, Australian investors arebeing given a compelling alternative to the ASX, the country’s predominant exchangesince the mid-1980s. Chi-X has gone from a fledging startup in 2011 to now handlingregularly up to over 29% of all on-exchange equity trades...
Blog

ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety

The lack of healthcare cybersecurity is one of the most significant threats to the sanctity of the global healthcare industry. This is made evident by the fact that in 2020 more than 18 million patient records were affected by successful cyber-attacks on the U.S. healthcare system.Health professionals should not take this issue lightly, as financial...
Blog

Are Financial Services IT Pros Overconfident in Data Breach Detection Skills?

Tripwire studied confidence vs. knowledge of financial services IT security pros on seven key security controls necessary to detect a data breach. For many controls IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data. ...
Blog

Five Men Arrested in Connection with the 2014 JPMorgan Hack

In August of 2014, it was reported that a group of hackers had exploited a vulnerability in the websites of JPMorgan. After breaking into the company’s network, the attackers then allegedly staged additional attacks that were custom-made to JPMorgan’s servers, which gained them access to internal systems on which customer account data was stored. Several months later, investigators revealed that...