Strategies

Attacking the Organism: Financial Services

Financial services are a well-known target of attack, based on a range of motivations. F5 Labs' Preston Hogue writes for SecurityWeek, discussing financial institutions' unique security environment , and how the need to understand the entire organism is critical.
February 20, 2020
1 min. read

When it comes to high-value assets, few industries can come close to financial services. It’s not just the obvious fact that banks are giant warehouses of money—banks represent critical pieces of infrastructure that entire economies rely upon.

Some of today’s largest financial institutions have more app developers than bankers. The way these companies interact with customers is by providing application experiences, since fewer and fewer customers want to actually venture into brick and mortar branches. The issue is complicated further by the fact that most banks are decades-old institutions, meaning they may be working with a range of technologies developed over the past 30 years.

This explosion of apps is a critical factor in such a security-dependent industry, creating a wealth of new insertion points for attacks. When customers use a banking app on their phone, there’s the app on the device, interacting with systems in the cloud, transmitted over networks, passing through all the traditional soft spots along the way. Recent reports indicate that half of banks say they’ve experienced data breaches or system downtime. As advanced as security is in the financial industry, clearly there’s still some catching up to do.

Read the full article published February 20, 2020 here: https://www.securityweek.com/attacking-organism-financial-services by SecurityWeek.

Join the Discussion
Authors & Contributors
Preston Hogue (Author)

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
article 13 min. read
What Is Access Control?
What Is Access Control?
article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
article 13 min. read