Asymmetrical Security Threats of Banking in the Cloud
- Date:March 17, 2020
- Author(s):
- Krista Tedder
- Report Details: 20 pages, 7 graphics
- Research Topic(s):
- Fraud & Security
- Cybersecurity
- PAID CONTENT
Overview
This original report, sponsored by Booz Allen Hamilton, explores how geopolitical tensions affect financial institutions’ threat landscape, the state of cloud usage in financial services and what financial institutions need to do to prepare for a heightened threat scenario.
This research report was independently produced by Javelin Strategy & Research. Javelin Strategy & Research maintains complete independence in its data collection, findings, and analysis.
Methodology
To assess how financial institutions are migrating to the use of cloud services and modernizing their payments infrastructure and capabilities, Javelin fielded three surveys covering different areas of responsibility within the enterprise.
Sample includes:
- 300 banking decision-makers: Adoption of and concerns around cloud services, vendor selection considerations
- 300 payments decision-makers: Adoption of and concerns around payments modernization, issues around faster-payments initiatives, key risks facing payments initiatives
- 300 cybersecurity decision-makers: Use of outsourced security services, prevalence of breaches, type and location of data compromised, planned cybersecurity investment/initiatives
Download Whitepaper Form
Related content
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
Foolproof Payments: How AI is Revolutionizing Payment Fraud
Payment fraud is becoming harder to detect as transactions move faster and fraud tactics evolve. Fraud teams are being pushed to make quick decisions with limited context, leading ...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world