SEC Network

Results: 425



#Item
111Social engineering / Spamming / Crime / Internet / Anti-phishing software / Malware / Password / Internet security / Identity theft / Computer network security / Computing / Phishing

From the Desk of [Insert Name Here] Virtually every financial institution is using the Internet to communicate and allow customers to conduct transactions online. Customers today expect this convenience, and if done sec

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-10-02 10:54:58
112Security / Phishing / Social engineering / Spamming / Cyberwarfare / Malware / Internet security / Anti-phishing software / Transaction authentication number / Computer network security / Computer crimes / Crime

From the Desk of [Insert Name Here] Virtually every financial institution is using the Internet to communicate and allow customers to conduct transactions online. Customers today expect this convenience, and if done sec

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-08-26 16:29:55
113Fair Fund / United States Securities and Exchange Commission / Financial services / Institutional investors / Mutual fund scandal / Financial economics / Investment / Corporate crime

Commonwealth Equity Services, LLP d/b/a Commonwealth Financial Network; Detwiler, Mitchell, Fenton & Graves, Inc.; and James X. McCarty

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-11-20 11:48:45
114Securities and Exchange Commission / Government / Corporate crime / Fair Fund / United States Securities and Exchange Commission

Administrative Proceeding: Commonwealth Equity Services, LLP d/b/a Commonwealth Financial Network, Detwiler, Mitchell, Fenton & Graves, Inc., James X. McCarty

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2010-08-12 17:49:42
115Public safety / Information technology management / Computer network security / Security controls / COBIT / National Institute of Standards and Technology / Information security / Regulatory compliance / Vulnerability / Computer security / Data security / Security

Staff Guidance on Current SCI Industry Standards

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-11-19 13:14:13
116Order / Computing / Computer networking / Internet protocols / Hot-potato and cold-potato routing / Routing protocol / Network architecture / Internet / Routing

SR-BATS[removed]Exhibit 5 Page 30 of 34

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-10-24 08:59:27
117Computing / Hot-potato and cold-potato routing / Network architecture / Internet / Routing

SR-BYX[removed]Exhibit 5 Page 31 of 35

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-10-24 08:58:54
118Investment / NYSE Arca / Financial services / Business / Dark liquidity / Order / New York Stock Exchange / Finance / Electronic communication network / Stock market / Financial markets / Financial economics

SR-BATS[removed]Exhibit 5 Page 28 of 29

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-10-30 09:30:35
119College Savings Plans Network / 529 plan

College Savings Plans Network d /7/7 Mr. Jonathan G. Katz, Secretary US Securities and Exchange Commission 450 51h Street, NW Washington DC 20549

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2005-07-19 15:47:55
120Public safety / Information technology management / Computer network security / Security controls / COBIT / National Institute of Standards and Technology / Information security / Regulatory compliance / Vulnerability / Computer security / Data security / Security

Staff Guidance on Current SCI Industry Standards

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-11-19 13:14:13
UPDATE