REGISTER

email 14 48

March 12, 2012 - Financial industry association Isitc says that nearly two thirds of its members plan to increase their information technology spending over the next two years as regulatory compliance continues to dominate the agenda.

March 12, 2012 - Financial industry association Isitc says that nearly two thirds of its members plan to increase their information technology spending over the next two years as regulatory compliance continues to dominate the agenda.

March 12, 2012 - Financial industry association Isitc says that nearly two thirds of its members plan to increase their information technology spending over the next two years as regulatory compliance continues to dominate the agenda.

March 9, 2012 - Technology giants such as Apple, Google, Facebook and Amazon are well positioned to cash in on the upcoming mobile payments bonanza thanks to their reputation for innovation but still have trust and privacy-related hurdles to overcome if they are to convince Americans to pick them over more traditional financial services providers, according to a report from Javelin Strategy & Research.

March 8, 2012 - The Skills Framework for the Information Age (SFIA), a model for matching the skills of the IT workforce to the needs of the business, has recognized two ISACA certifications: Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM).

March 8, 2012 - The Skills Framework for the Information Age (SFIA), a model for matching the skills of the IT workforce to the needs of the business, has recognized two ISACA certifications: Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM).

March 7, 2012 - The European Commission is promising to shake up cross-border securities settlement in the EU by cutting settlement timeframes and establishing a common regulatory framework for the region's 30+ central securities depositories.

March 2, 2012 - National Australia Bank is formulating a set of standard service level agreements that may be used by companies worldwide for securing data in public and private cloud applications.

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

Go to top