How to manage a trojan when you can´t reach it through internet
Posted in Security Architecture on Feb 27th, 2014
’Follow the money’ is a very useful phrase when working with financial institutions. It´s a rather common misperception that there are money everywhere in a bank. Most data that flows is mainly different kind of confirmation or personal data that is not connected the highly regulated transaction flows. In one end of the money flow […]