• Showing 1-50 of 387 items
  • 1
  • 2
  • 3
  • ...
  • 8
  • >>
  1. WSJ's Vigna on Data Privacy & Facebook's Monopoly

    Beyond its uses for cryptocurrency, can blockchain help prevent unauthorized data mining and redistribution by decentralizing ...
  2. The DOL Fiduciary Rule Explained

    The Department of Labor (DOL) fiduciary rule expanded the “investment advice fiduciary” definition under the Employee Retirement ...
  3. Online Banking

    Online banking is the performance of banking activities via the Internet.
  4. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system.
  5. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, targeted attack on an organization’s computers to gather ...
  6. Hacktivism

    Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer ...
  7. Dark Web

    The dark web refers to encrypted online content that is not indexed on conventional search engines.
  8. HIPAA Waiver of Authorization

    A HIPAA waiver of authorization is a legal document that allows an individual’s health information to be used or disclosed ...
  9. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious software security weakness that the vendor or developer ...
  10. Hard Fork

    A hard fork (or sometimes hardfork) is a radical change to the protocol that makes previously invalid blocks/transactions ...
  11. Cloud Computing

    Cloud computing is a model for delivering information technology services; resources are retrieved from the internet through ...
  12. Accounting Information System - AIS

    An accounting information system is the collection, storage and processing of financial and accounting data that is used ...
  13. Errors And Omissions Insurance - E&O

    Errors and omissions insurance is a professional liability insurance that protects companies & individuals against claims ...
  14. Keyboard Logger

    A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and ...
  15. Honeypot

    A honeypot is a security measure used to prevent and dismantle cyberattacks by luring attackers to a specific area of a computer ...
  16. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the area of computer security, then determining what steps to ...
  17. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict damage to a company by exploiting vulnerabilities in its ...
  18. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom ...
  19. Cloud Security

    Cloud security is the protection of data stored online from theft, leakage and deletion.
  20. Computer Abuse

    Computer abuse is the use of a computer to do something improper or illegal.
  21. Disaster Recovery Site

    A disaster recovery site, also known as a backup site, is a place that a company can temporarily relocate to following a ...
  22. Botnet

    A botnet is a network of internet-connected devices that have been compromised by hackers without the knowledge of the legitimate ...
  23. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic information private, ranging from personal protection to complex ...
  24. Bring Your Own Device (BYOD)

    Bring Your Own Device (BYOD) is a company policy that allows employees to use their personal mobile devices and laptops for ...
  25. Cloud Hijacking

    Cloud hijacking is the breaking into or taking over of the cloud account of an individual, business or other organization ...
  26. Eavesdropping Attack

    An eavesdropping attack is an incursion where someone tries to steal information that computers, smartphones, or other devices ...
  27. Macro Virus

    A macro virus infects a software program and causes a series of actions to begin automatically when the program is opened.
  28. Cyber Identity

    Cyber identity refers to the personality or personalities that are created through a person’s online interactions.
  29. Data Migration

    Data migration is the process of moving stored digital information between computers, systems or formats.
  30. What happens when crypto-bros and big banks collide?

    What do the world's largest banks and manifesto-clutching cypherpunks have in common? A quest for enhanced information security ...
  31. De-Anonymization

    De-anonymization is a reverse data mining technique that re-identifies encrypted information.
  32. Behavioral Analytics

    Behavioral analytics is an area of data analytics focuses on providing insight into the actions of people.
  33. Personally Identifiable Information (PII)

    Personally Identifiable Information (PII) is information that, when used alone or with other relevant data, can identify ...
  34. Passwords Are Obsolete, Get With the Blockchain

    Blockchain technology could provide a better alternative to memorizing long, confusing, and easily forgotten passwords.
  35. Enterprise Information Management (EIM)

    Enterprise information management refers to the optimization, storage and processing of data created and used by a large ...
  36. Ethereum Smart Contracts Vulnerable to Hacks: $4 Million in Ether at Risk

    About 34,200 Ethereum smart contracts worth $4.4 million in ether are vulnerable to hacking, according to a new report.
  37. CoinDash: Ethereum Hacker Returned 20,000 Stolen Ether Worth $17 Million

    A hacker quietly returned 20,000 ethereum tokens to CoinDash after stealing them during the company's ICO. Why?
  38. Choosing the Right Day-Trading Software

    Software has made day trading quick and automatic. How to choose the best for your needs.
  39. Debit Card Fraud: Is Your Money At Risk?

    Find out how your money is becoming more vulnerable to debit card fraud by criminals and hackers. Use these nine easy ways ...
  40. The Pros And Cons Of Internet Banks

    Learn how internet banking services stack up against their brick-and-mortar peers. Find out what internet banks have to offer ...
  41. Introduction To Accounting Information Systems

    Learn what an accounting information system is and the six main parts of this indispensable business asset for managing a ...
  42. Tesla’s Cloud Was Hacked for Mining Cryptocurrency

    Tesla claims that customer privacy and vehicle safety weren't compromised during the attack.
  43. Boiler And Machinery (BM) Insurance

    Boiler And Machinery Insurance (BM) provides coverage for physical damage to and financial loss from equipment breakdown.
  44. What Is the Dark Net?

    The Dark Net (or Darknet) is a subset of secret websites that exist on an encrypted network.
  45. A Day In the Life Of a Public Accountant

    Here's an inside look at the workdays of two experienced CPAs, to give you an idea of what it might be like to pursue a career ...
  46. Zero Liability Policy

    A zero liability policy may be implemented in order to give credit card holders more assurance about dealing with fraudulent ...
  47. Secure Electronic Transaction - SET

    Secure electronic transaction is an early e-commerce protocol that was used to keep credit card information protected online.
  48. Social Media

    Social media is a computer-based technology that facilitates the sharing of ideas and information and the building of virtual ...
  49. Uninsurable Risk

    Uninsurable risk is a condition that poses unknowable or unacceptable risk of loss.
  50. What Are the GAAP Standards for Digital Documents?

    Learn how Sarbanes-Oxley Act of 2002 affects document storage requirements under GAAP.
  • Showing 1-50 of 387 items
  • 1
  • 2
  • 3
  • ...
  • 8
  • >>
Hot Definitions
  1. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
  2. Liquidity

    Liquidity is the degree to which an asset or security can be quickly bought or sold in the market without affecting the asset's ...
  3. Federal Funds Rate

    The federal funds rate is the interest rate at which a depository institution lends funds maintained at the Federal Reserve ...
  4. Call Option

    An agreement that gives an investor the right (but not the obligation) to buy a stock, bond, commodity, or other instrument ...
  5. Standard Deviation

    A measure of the dispersion of a set of data from its mean, calculated as the square root of the variance. The more spread ...
  6. Entrepreneur

    An entrepreneur is an individual who founds and runs a small business and assumes all the risk and reward of the venture.
Trading Center