Anthony Johnson discusses race, management, and cybersecurity in the capital markets.
Every new innovation in the world of market and reference data brings with it a new set of challenges-from managing new datasets to ensuring uptime during storms and natural disasters.
As one of the major US exchanges, Nasdaq is vulnerable to cyber attacks.
Waters selected three industry experts with three very different opinions on what it will take for financial organizations to mount an effective defense.
Soltra Edge acts like a threat intelligence server that aggregates and distributes threat content from within an organization.
'Ethical hacking' seeks to develop people as a point of a system's strength.
BT's team of security specialists test IT systems by imitating hacker attacks.
Cisco's solution offers clients detailed visibility into network layers.
Patching is a challenge, but vitally important.
A headline-grabbing hack may be a bit overblown.
A look back at the best content published across all the Waters brands.
Opinions differ on how critical the latest cyberattack is being touted.
Firm completes second buy in four months.
New service to help organisations combat cyber threats
Eight sections with suggested practices broker-dealers should adopt
Exchange developments and cybersecurity take the lead for the year's sell-side coverage.
Market, counterparty, credit, liquidity ... operational, cyber ... what's next?
Focus needs to be on reacting, not stopping every threat
Impromptu C-level survey reveals anxiety about internal, external vulnerabilities
Official says Hong Kong's valuable data makes it a target for hackers, so firms must remain vigilant
Soltra Edge will distil intelligence on threat vectors.
DTCC highlights clear and present cyber danger with whitepapers and joint venture.
Investors are a hedge fund's lifeblood, entrusting their most confidential, personal data to the financial advisors who manage their assets.
Capital markets firms must take more steps to protect sensitive information and market data from cyber-terrorists intent on stealing and reselling valuable data, including carefully guarding their internal data architectures and external providers,…