Connect with us






By Robert Kang

Everyone has emails that they consider to be no one’s business except their own.  Our emails contain everything from tax returns to intimate photos meant only for someone special.  Imagine the horror if a hacker infiltrated an email account belonging to someone you knew and made those emails public.  Imagine the horror if it happened to you.

For many people, no imagination is needed, because it did happen to them.   This type of hacking is a crime and many hackers have been brought to justice.  But that doesn’t change the horror of being victimized.  This article walks through some of the country’s most prominent personal privacy hacks and shares tips for responding to similar attacks.  Learning what happened may help protect you and your loved ones from the same techniques used by these hackers.

Part 1:
Protecting yourself from 2010’s “Hollywood Hacker”
(Password Challenge Questions)

Renee Olstead is an actress and singer.  Olstead started acting when she was five years old, and has appeared in shows like “Touched by an Angel” and “The Secret Life of the American Teenager.”  She works hard and has a bright future.   Renee is also a survivor of sex-based computer hacking.

In 2010, a then-unknown hacker hacked into Olstead’s personal email accounts.  Her private photos, including nude photos, appeared on the internet, where they spread like wildfire.  It was a gross violation of her privacy.  Olstead even attempted suicide, though fortunately wasn’t successful.  She was only 21 at the time.

Olstead shared her story to a court in 2012 as follows.   “About two years ago, I received a phone call from (FBI) Agent (Josh) Sadowski informing me that my personal information had been compromised.  And basically that it was a matter of time before these images hit the internet . . .  I was humiliated.”

Olstead wasn’t alone.  Between November 2010 and October 2011, the FBI tied over 50 female victims to Olstead’s hacker.  The list reflected a “who’s who” of Hollywood: Scarlett Johansson, Mila Kunis and Christina Aguilera, among others. The widespread sharing of their intimate photos online created one of the most graphic events in American cyber history.  This mysterious assailant became known as the “Hollywood Hacker.”

The case ends with Olstead and Johansson learning their hacker’s identity, and even delivering some payback.  In 2012, the FBI tracked down and arrested Christopher Chaney, a then-35 year old man living in Jacksonville, Florida.  One technique law enforcement uses to find hackers involves tracking their Internet Protocol (IP) address.

Think of an IP address as the internet version of a calling card which is left behind when one computer talks with another.  Chaney had evaded capture using a service called “Hide My IP,” which masked his IP address.  However, the FBI was watching, and the one time Chaney slipped, the FBI found him.  On February 10, 2011, armed with a warrant, the FBI raided Chaney’s home and arrested him.  The trial court sentenced Chaney to ten years, and his sentence was affirmed on February 22, 2016, by the United States Court of Appeals for the Ninth Circuit.  Barring the unexpected, Chaney will remain a guest of the penal system for many years.

The sentencing phase of Chaney’s prosecution is where Olstead and Johansson came in.  Survivors are often reluctant to speak in court, which requires them to share intimate pain in a very public setting.  But victim impact statements are invaluable to putting criminals behind bars.  Olstead recounted her experiences in court. “I realized that suddenly I wasn’t the girl who works full time, is a full-time student still manages to make the Dean’s List,” she told the judge.  Instead, I was the girl who was naked on the internet.  And this is something that has followed me . . . it was the scariest moment of my life.”  Johansson also shared her story in court, via a recorded video statement.  “I have been truly humiliated and embarrassed,” she said.  “I find Christopher Chaney’s actions to be perverted and reprehensible. As long as he has access to a computer, Christopher Chaney continues to be a threat to women who believe email communications are personal and confidential.”

These statements impacted the judge, who referenced them and other victim statements, in sentencing Chaney.  Chaney’s ten year sentence was nearly twice the length proposed by prosecutors.

How did Chaney hack into his victims’ online accounts?  Was he a computer genius?  An inveterate hacker who played electronic hide-and-seek with the NSA in his spare time in a basement?

The answer might surprise you.

Chaney was not a professional hacker.  But he was a social engineer of sorts, and clever enough to figure out how people answer the “challenge questions” used by many online service providers to help users reset a lost or forgotten password.  We’ve all seen them: “What is your pet’s name?”  Or “What is the make of your first car?”   Most of us don’t think twice about answering those questions honestly.  Neither did Chaney’s victims.  That inclination to honesty gave Chaney his chance.

Like a detective, Chaney studied his targets: famous women.  He read magazines and news articles about them; he subscribed to online sources and databases like Intelius that compiled celebrity dossiers.  This careful research enabled Chaney to figure out the answers to many of the celebrity’s email password reset challenge questions.  For example, in one instance, Chaney successfully hacked into one celebrity’s account using the name of her pet.  After gaining access to the victim’s account, Chaney set it to automatically forward the victim’s emails to other accounts controlled by Chaney.  When the victim found herself locked out of an account, she assumed it was an electronic glitch and simply reset it.  But, like many of us, the victim didn’t think to check whether the account had been altered to forward emails automatically to someone else’s account.

Chaney’s work opened him up to a treasure trove of personal emails. He learned about Scarlett Johansson’s separation from Ryan Reynolds before the news became public, for example.  Before being arrested, Chaney also harvested intimate celebrity photos, many of which he shared with others.  The rest is internet history.

Part 1 Tips:

1. Be strategic when providing answers to password reset challenge questions.  Don’t use your actual mother’s maiden name, for example, but rather a word that only you would know.  Some services give you a range of questions.  Changing this personal habit is a good way to protect your online privacy.

  1. Be suspicious if you can’t open an email account.  If your password doesn’t work, don’t assume it’s a glitch.  Instead, treat it as a potential hack.  Inform your service provider.  And check that your account settings haven’t been tampered to forward emails automatically to a different email account.
  2. Want to learn more about challenge questions?  Click HERE – Security Questions Don’t Protect You: Here’s Why.

Part 2
Protecting Yourself from 2014’s “Celebgate” hacker
(Phishing Emails)

Crime never stops.  Two years after Chaney’s capture came “Celebgate” – the name of a hacking spree that, again, resulted in the viral posting of of intimate photos belonging to famous celebrities like Jennifer Lawrence and Kate Upton.  The event came to be known as “Celebgate” and “the Fappening.”

But while the attacks continued, so did the government’s commitment to capturing the guilty.   On March 15, 2016, the FBI and United States Attorney’s Office announced that a then-36 year old Pennsylvania man, Ryan Collins, signed a plea agreement, requiring him to plead guilty to two cyber crimes – felony violation of the computer Fraud and Abuse Act and violation of the unauthorized access to a protected computer system laws.  (Related – Hacker Admits to Stealing Celebrity Nude Photos, Takes Plea Deal). He one of several criminals caught in connection with the Fappening, all of whom used similar techniques to gain unlawful access to their victims personal information.

In order to gain access to his victims’ accounts, Collins, and others like him, engaged in “phishing” – a hacking technique that involves creating fake email accounts that look trustworthy.  For example, Collins created email accounts with names like “[email protected]” and ”[email protected]”  Using these fake accounts, Collins sent emails to celebrities, asking them (or asking the people managing those accounts) for account and password information.  If he was successful, Collins downloaded the contents of a victim’s email or cloud storage account.

As part of the plea deal, prosecutors recommended an 18-month prison sentence, though the trial judge may choose to impose a different one.  Collins was sentenced on October 26, 2016, in a federal courthouse in Harrisburg Pennsylvania.  The United States Attorney’s Office noted that investigators have not uncovered evidence linking Collins to the actual leaks comprising the Fappening, or that he shared or uploaded the information that he obtained. The hunt continues.

Part 2 Tips:

4.Phishing emails are everywhere; don’t take the bait.  View emails asking for your password or other account information with suspicion.  Phishing emails often ask for account information, in order to “verify” security.  But even if you decide to change a password, don’t click on any links within the email.  Instead, go to the account website and change the password directly.

  1. Use two-factor authentication where available.  Many online services allow users to add an additional step before logging into an account, such as the use of a unique code sent to the user’s phone at the time of login. It’s a minor inconvenience that is worth the effort.
  2. Use long, strong passwords that include a mix of numbers, letters and special characters.  Need tips?  Click HERE – Microsoft – Tips for creating a strong password.
  3. Want to learn more about phishing?  Click HERE – NCSC’s Know the Risk – Raise your Shield: Spear Phishing.

Part 3:
Protecting yourself from other hacking methods
(working with law enforcement)

Starting this article with celebrity hacks may give the impression that the criminal justice system only moves for the rich and famous.  Not true: celebrity hacks gain major media attention, but they represent only a fraction of successfully prosecuted sex-based cyber crimes.

Assistant United States Attorney Lisa Feldman explains.  A career cyber prosecutor with the United States Attorney’s Office for the Central District of California, Feldman and her colleagues are at the forefront of catching and prosecuting cyber criminals.

“We’re talking about the Chaney (celebrity) hacking case,” notes Feldman during an interview.  “But most of the victims we work with aren’t celebrities.  They’re regular people.  And we put the same effort into prosecuting those cases as we do the celebrity cases.”  These aren’t empty words.  Especially in recent years, police and prosecutors have racked wins against sex-based cyber criminals across the nation from California to Florida.

Feldman notes the sobering reality that many crimes go unreported, however.  She cites the arrest and conviction of Luis Mijangos as an example.  At the time of his arrest, Mijangos was a 32 year old man living in Santa Ana, California.  Mijangos used many of the same techniques used by other hackers, such as phishing, to gain access to his victims’ computers and accounts.  But where Chaney and Collins primarily collected intimate photos, Mijangos engaged in “sextortion” – a malign, interactive type of cyber crime.  For example, in addition to harvesting intimate photos, Mijangos, a more skillful hacker than Chaney and Collins, would control the webcams built into his victims’ computers and use them to photograph women in their private moments.  Mijangos would then contact the women to blackmail them into sending him even more nude photos.  “I never knew if it was someone that I knew or if it was a complete stranger (who attacked me,)” recounted one victim during the sentencing portion of Mijangos’ eventual prosecution.  “It would be in the back of my mind no matter where I went or who I went with.  It was always there.”

Mijangos came to law enforcement’s attention after one of his victims reported his crime.  The FBI caught Mijangos after backtracking though some of the emails he sent to that victim to domains registered in his name. But the horror is that Mijangos’ computers showed he had victimized over 200 people, including over 30 underage girls.  None of the underaged victims reported the crime to law enforcement.  Why?

“They were young,” says Feldman, as she recounts the reasons people hesitate to report such crimes. “They are often afraid their parents will find out.  They might also be scared to tell people they’ve been victimized.  They may blame themselves.  And criminals like Mijangos know how to exploit that fear and threaten their victims into keeping quiet.  It’s really scary for them.  But we hope they tell us, so we (law enforcement) can help them.”

Feldman understands the difficulty that victims and survivors face in reporting sex-based crimes and tries to help members of the public understand their options before disaster strikes.  In addition to comforting individual victims, Feldman teaches safe cybersecurity habits in her spare time to the public.  It’s a form of community outreach intended to build trust between the public and law enforcement.  Her audiences include schoolchildren and their parents.  Nor is she alone.  Many of her colleagues – including her high ranking supervisors – similarly volunteer their time.  Tracy Wilkison, the Chief of the Cyber and Intellectual Property Crimes Section in Feldman’s office, shared her motivations for volunteering: “Because cybercrimes can happen to anyone, it’s important for us not only to vigorously investigate and prosecute the crime after it has happened, but to also reach out and teach prevention as widely as possible,” said Wilkison.  “We are providing tips to better protect oneself, as well as spreading the word that law enforcement can be trusted to support and aid victims of cybercrimes. We understand how horrifically violated the victim can feel, and we work very hard to help.”

Working with law enforcement requires courage on the part of a cyber crime survivor.  But, as with the Chaney prosecution, the results of such cooperation can be powerful.  In the Mijangos case, one of his victims, identified as “JM” explained why she overcame a clear fear of her attacker to work with law enforcement.  “He was threatening to ruin my work, to talk to my employers and send them pictures that he had personally grabbed also from my personal computer,” she explained during a court hearing.  “I would log onto work, he would somehow just pop up on my computer and call me a bi*ch . . . I started throwing up.  I got a rash, developed a rash on my face, and I just couldn’t go to work.”  But JM found it important to stop Mijangos. “Prior to being a victim of this man, I was a victim of domestic violence,” she told the judge, “and I would tell you that there is no difference (between the two.)  And being so that I had just been a victim of (domestic violence) is why I decided to stand up to him.”

JM’s message came through loud and clear.  In 2011, the judge sentenced Mijangos to six years in prison.

Part 3 Tips:

      8.Contact law enforcement if you believe you were the victim of a crime.  Encourage your friends and loved ones, who may have been victimized, to do the same.  Anyone can be a victim, even celebrities who may be someone’s personal hero.  Stars like Olstead and Johansson found the courage to share their stories publicly, and their courage contributed to the long sentence that shackles Chaney.  Mijangos was convicted after one survivor found the strength to report the crime and work together with law enforcement.

  1. Cover your computer’s built-in webcam when not in use.  Sophisticated hackers like Mijangos can use it to take photos, even when the camera looks like it’s off.
  2. Learn more about protecting personal privacy.  This article only touches the surface of available defenses.  The Department of Homeland Security, in particular, has created cybersecurity guides geared towards protecting people from all walks of life, from children to undergraduate students to elder Americans.  (LINK – DHS Guides).Final Takeaways
    Our online accounts represent a treasure trove of intimate information.  Law enforcement has scored big victories in capturing and prosecuting offenders.  But the first line of defense rests with each of us.  Completely protecting oneself from cyber criminals is a full-time job.  But it is possible to reduce the risk of being low hanging fruit by learning how to protect yourself against the methods employed by hackers like Chaney, Collins and Mijangos.  And share the courage shown by survivors such as JM, Renee Olstead and Scarlett Johansson, with others.  Their courage may inspire other survivors of cybercrime to contact law enforcement.



What does cybersecurity look like for the financial sector in 2021?



What does cybersecurity look like for the financial sector in 2021? 1

By Neill Lawson-Smith, managing director at CIS

The landscape is changing incredibly fast, with cybercriminals using the most up-to-date technology to hack systems. Here are the six areas those in finance should be watching out for…

The finance and insurance sector is increasingly becoming a notable target for cyber attacks. Many of these breaches happening are believed to be due to inadequate security measures when teams or businesses are using cloud services.

The financial industry is also being affected by changes in processes with more fintech, virtual banks, and other digital disruptors impacting the market. The landscape is changing incredibly fast, with cybercriminals using the most up-to-date technology to hack systems, so it is therefore up to the financial sector to keep up to avoid security breaches.

What does this look like for the year ahead in the financial sector? Here are the Six areas those in finance should be watching out for:

  1. AI securityand cyber defence

Both Cybercriminals and cyber defence are commonly using Artificial Intelligence (AI). In cybersecurity, it is used to identify new threats, as well as assess the effectiveness of the responses to threats, enabling them to foresee and essentially block attacks before they happen. It is also used to spot behavioural patterns and can quickly identify possible infiltrations.

Hackers have also started to use AI to make it easier for them to get past security systems in place. This year, it is likely that AI will be increasingly used as a means of gaining personal details (i.e. credit card details) as well as optimising spam phishing campaigns.

  1. Mobile cybersecurity in banking

With the number of consumers using their mobile devices for banking and financial transactions increasing, especially since the COVID-19 pandemic has rendered society predominantly cashless, cybercriminals have been heavily targeting mobile systems. For example, mobile malware only targets mobile phone operating systems. The most common forms of mobile malware are virus and trojans, spyware and madware (mobile adware), phishing campaigns, and browser exploits.

This means it is now more important than ever to protect mobile devices to the same extent as traditional hardware.

The same protocols that are in place to ensure your staff PCs and laptops are secure now, need to also be applied to their mobile devices as well, such as:

  • Ensuring the latest versions of the operating system and other applications are installed.
  • Installing a firewall.
  • Enabling mobile security software to protect against malware and viruses.
  • Using password protected lock screens.
  • Ensuring apps are only downloaded from official sites like Apple App store and Google Play.
  1. Multi-factor authentication

Multi-factor authentication adds an extra layer of security to all your business networks by ensuring every transaction or login is supported by at least two security measures for access. It is one of the easiest security measures to implement within your business and is becoming more common within the financial sector for many transactions. The traditional username and password are becoming increasingly easy for cybercriminals to acquire, whereas adding an extra identification method, that is not easily accessible to the hackers, ensures an extra layer of protection.

The most commonly used multi-factor authentication methods are:

  • Passwords – They should be complex and comprise at least eight characters and be a combination of upper- and lower-case letters, numbers, and special characters.
  • One-time use code – A randomly generated code sent via SMS or email which is used only once. With weaknesses in mobile networks and email accounts, these can however be intercepted by hackers.
  • App generated codes – a code generated by an app on a mobile phone often created by scanning a QR code that contains a ‘key’. As the key is stored on the phone itself this is less likely to be intercepted by a third party.
  • Physical authentication keys – this is a USB which the user inserts every time they login from a new computer. Unfortunately, they don’t work on all devices without adapters (such as iPhone, MacBook or Android).
  • Biometrics – Using a fingerprint, voice, or an eye dent is an effective identifier. They are extremely difficult to hack but if they are, they cannot be used ever again for anything.
  • Information – this could be something that only the user would know – either a password or a piece of information.

Most of these methods are free or relatively cheap to implement and don’t require anything other than a mobile phone for the user. The added security of multi-factor authentication means even if a hacker has acquired a username/password combination there is still an extra security barrier preventing access.

  1. Refined testing

As the finance industry is constantly changing, then so too are the security threats. Financial cybersecurity is an ongoing commitment, so installing new anti-virus software and implementing MFA, and stopping there is not going to keep you protected for long. It requires ensuring software and firewalls are up to date as well as ensuring access is regularly updated. In addition to this constant maintenance regular testing of the systems is essential. All systems have vulnerabilities, and as these change, cybercriminals learn to overcome them, and therefore software develops.

One thing to remember is that it is not possible to be over-cautious when it comes to cybersecurity. Regular penetration testing essentially identifies any weaknesses in your systems before the cyber criminals do. It is essential to schedule penetration testing or vulnerability scans at least once a quarter unless compliance dictates otherwise. They can be carried out using a vulnerability scanner.

  1. Hiring the right people

It is crucial to have the right team on hand to ensure your systems are up to date, regularly tested and maintained is essential.

Your IT team should have the following skills and knowledge:

  • Knowledge and understanding of the company’s IT infrastructure
  • Knowledge of cybersecurity best practices
  • Understanding of company processes and data flows
  • Up to date knowledge of cybersecurity solutions
  1. Plan a Defence, Prepare for Attack…

Although businesses can take many precautions, there are limitations on skills, investment and timescales in implementing a comprehensive cybersecurity infrastructure, it is essential that appropriate procedures, policies and processes are established to ensure that an appropriate response is carried out in the event of a detection – whether manual or ideally automated – so that whenever an attack occurs, the appropriate and proportionate response is carried out immediately to limit any further damage or intrusion.

Continue Reading


Data protection: it’s time to reassess your security strategy



Biometrics and data protection in financial services

By Tony Pepper, CEO of Egress

It’s no secret that the Covid-19 pandemic has created a perfect storm of cybersecurity risk. External threats are heightened, but there’s also a higher level of internal risk too, exacerbated by home working. With most financial services organisations planning to continue with mass remote working for the foreseeable future, it’s important for security teams to review their strategy and assess whether it still works in this new landscape. When it comes to insider threat, there are three key areas that IT leaders should focus on: building a positive culture around security, understanding their organisation’s level of risk and protecting their people.

  1. Build a security-positive culture

Many organisations have unknowingly instilled a security-negative culture among their employees, where people are punished or shamed if they cause a security incident. While they might think that this would discourage employees from causing data breaches for fear of repercussions, this actually makes your organisation less secure. Our Outbound Email Security Report found that 62% of organisations rely on their people to report email data breach incidents – and if employees are too afraid to come forward, that means your business is at risk of developing a security blind spot.

A security negative culture won’t actually prevent data breaches caused by human error, something which organisations need to recognize as largely unavoidable without technological intervention; it just delays remediation, which makes every incident worse. By creating a security-positive culture, you can better engage and educate employees, as well as ensure you’re able to rapidly triage any incidents if they occur.

  1. Understand your risk

When mapping out your risk, you’ll likely find that the picture looks very different to how it did even a year ago. In the past, organisations have focused on their networks and their devices when it came to security strategy. While these are vital areas for consideration, what hasn’t been as well-addressed to date is the human aspect of risk, particularly human error. You need to look closely at the tools that your employees are using daily to facilitate digital communication with clients and colleagues, including when sending sensitive information.

Employees are specifically using email more than ever before – our recent research found that 94% of organisations are sending more emails due to Covid-19, with one-in-two IT leaders reporting an increase of more than 50%. With this expansion of email volumes comes an increase in the risk that an email containing sensitive data might be misdirected. Remote working has also heightened the threat – our research found that 35% of organisations’ serious email data breaches were caused by remote working. Why? The causes lie in their behavior and the environments in which they operate. Some individuals may feel they’re able to take more risks away from the “watchful eyes” of their Security team, and every employee is  faced with a myriad of distractions that make them more likely to make a mistake.

It’s time for organisations to take stock of their risk by looking at where gaps in their security might exist – and provide safety nets for their employees that can automatically detect and mitigate inadvertent data breaches and risky behaviour.

  1. Protect your people

It goes without saying that not all data breaches are caused by malicious activity. An overwhelming amount of data breaches are caused by hardworking employees making honest mistakes, from sending an email to the wrong person to responding to a phishing attack. Unfortunately, human error is an unavoidable part of life, and mistakes will happen. In the past, many organisations have taken the approach that employee error can be ‘trained away’, embarking on comprehensive security training programs in the hope that security incidents might decrease.

Unfortunately, if that were the case, then employee activated data breaches would be a thing of the past! Organisations need to employ a multifaceted approach when it comes to avoiding accidental insider data breaches – education and training remain an important element, but ultimately businesses need to implement the right technology to provide a safety net for their people. Many organisations have legacy DLP solutions in place that cannot mitigate the risk as they fail to fully understand employees’ behaviour.

Often, these tools stand in the way of productivity, prompting users even when there isn’t a legitimate risk. When click fatigue sets in, these solutions become ineffective, with users ignoring prompts whenever they appear. Luckily, advances in machine learning mean that there’s technology available to prevent insider data breaches such as misdirected email, by deeply understanding the way that users behave and the context in which they share data, to ensure emails are sent to the right recipients with the right level of security.

The vast majority of organizations will never go back to every employee working full time within the office environment, instead post-pandemic we will see a myriad of different approaches – with some based in the office, while others work at home part or full-time, and as the world opens up again, their locations may change throughout the day. To mitigate risks from inadvertent errors to intentional data exfiltration, CISOs must address their security culture and protect their human layer with intelligent controls that mitigate employees’ behaviors and stop breaches before they happen.

Continue Reading


Sumitomo Life Insurance Selects Talend to Build Company’s Data Infrastructure



Sumitomo Life Insurance Selects Talend to Build Company’s Data Infrastructure 2

Leading life insurer uses Talend in data lake environment for data analytics

Talend (NASDAQ: TLND), a global leader in data integration and data integrity, announced today that Sumitomo Life Insurance Company, one of the Japan’s leading life insurance companies, has selected Talend Data Fabric for its data analytics infrastructure.

Sumitomo Life aims to become the most trusted and supported company by its stakeholders, including its customers, and to grow sustainably and stably. Sumitomo Life’s vision is to offer advanced products to enable customers to live vigorously. To respond to that, the company is developing and delivering cutting-edge products that respond to its customers’ current and expected futures needs in areas focusing on nursing care, medical insurance and retirement planning.

“With the trust from our customers as the starting point of all our activities, Sumitomo Life is providing optimal life insurance services to every person through the sound management of the insurance business,” said Mr. Masakazu Ohta, General Manager in Charge of Information System Department at Sumitomo Life. “As a new approach, it was necessary to build a common foundation for big data management, and Talend is the driver. Talend’s superiority in cloud implementation, development productivity, features, and licensing model convinced us to be part of this journey together.”

To meet the needs of its customers and offer them innovative products and services, Sumitomo Life has decided to build a foundation for data analysis (Sumisei Data Platform) in the cloud for the promotion of new insurance products. The company evolved its legacy data environment to the new environment where they can store the data extracted from various systems both on-premises and effectively in the cloud.

In order to meet the needs of each individual customer and provide the best insurance for them, Sumitomo Life uses Talend Data Fabric as the hub of its data infrastructure. This manages data across the organization and integrates data into a data lake, which makes them able to utilize data across the company.

“We have been able to release projects with the continuous support of Talend, even amid the changing business environment in the Covid-19 crisis. We will continue to collaborate with Talend in order to actively promote company-wide data analysis projects,” added Mr. Ohta.

“The insurance market is one of the most competitive sectors. By facing tight regulations and complex customer needs, companies must be at the forefront of innovation to offer even more services and new products to its customers,” said Kenji Tsunoda, Country Manager Japan, at Talend. “Talend helped Sumitomo Life reinvent its data-driven infrastructure to provide a data management platform that enables the development of advanced products for its customers.  We are delighted to support Sumitomo Life in the pursuit of their vision.”

Continue Reading
Editorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.

Call For Entries

Global Banking and Finance Review Awards Nominations 2021
2021 Awards now open. Click Here to Nominate

Latest Articles

Bitcoin hits $1 trillion market cap, surges to fresh all-time peak 3 Bitcoin hits $1 trillion market cap, surges to fresh all-time peak 4
Top Stories7 mins ago

Bitcoin hits $1 trillion market cap, surges to fresh all-time peak

By Gertrude Chavez-Dreyfuss and Tom Wilson NEW YORK/LONDON (Reuters) – Bitcoin touched a market capitalization of $1 trillion as it...

Packaged food giants push direct online sales to gauge consumer tastes 5 Packaged food giants push direct online sales to gauge consumer tastes 6
Business9 mins ago

Packaged food giants push direct online sales to gauge consumer tastes

By Siddharth Cavale and Nivedita Balu (Reuters) – Packaged food giants including Kraft Heinz, General Mills and Kellogg are pushing...

FTSE 100 ends higher on improving economic activity; gains for the third week 7 FTSE 100 ends higher on improving economic activity; gains for the third week 8
Trading6 hours ago

FTSE 100 ends higher on improving economic activity; gains for the third week

By Shivani Kumaresan, Amal S and Shashank Nayar (Reuters) – London’s FTSE 100 ended higher on Friday after the economy...

European shares end higher on strong earnings, positive data 9 European shares end higher on strong earnings, positive data 10
Banking6 hours ago

European shares end higher on strong earnings, positive data

By Sagarika Jaisinghani and Ambar Warrick (Reuters) – Euro zone shares rose on Friday, marking a third week of gains,...

UK bond yields head for biggest weekly rise since June 11 UK bond yields head for biggest weekly rise since June 12
Trading6 hours ago

UK bond yields head for biggest weekly rise since June

LONDON (Reuters) – British government bond prices fell again on Friday as a global debt sell-off continued on expectations of...

Siemens Healthineers gains EU nod for $16.4 billion Varian buy 13 Siemens Healthineers gains EU nod for $16.4 billion Varian buy 14
Business6 hours ago

Siemens Healthineers gains EU nod for $16.4 billion Varian buy

BRUSSELS (Reuters) – EU antitrust regulators on Friday cleared with conditions Siemens Healthineers’ $16.4 billion acquisition of U.S. peer Varian,...

Teed off: As COVID fuels S. Africa's housing crisis, golf courses feel the heat 15 Teed off: As COVID fuels S. Africa's housing crisis, golf courses feel the heat 16
Top Stories7 hours ago

Teed off: As COVID fuels S. Africa’s housing crisis, golf courses feel the heat

By Kim Harrisberg JOHANNESBURG (Thomson Reuters Foundation) – It sounds like a developer’s dream: A greenfield site in the heart...

UK might need negative rates if recovery disappoints - BoE's Vlieghe 17 UK might need negative rates if recovery disappoints - BoE's Vlieghe 18
Top Stories16 hours ago

UK might need negative rates if recovery disappoints – BoE’s Vlieghe

By David Milliken and William Schomberg LONDON (Reuters) – The Bank of England might need to cut interest rates below...

UK economy shows signs of stabilisation after new lockdown hit 19 UK economy shows signs of stabilisation after new lockdown hit 20
Top Stories16 hours ago

UK economy shows signs of stabilisation after new lockdown hit

By William Schomberg and David Milliken LONDON (Reuters) – Britain’s economy has stabilised after a new COVID-19 lockdown last month...

Dollar extends decline as risk appetite favors equities 21 Dollar extends decline as risk appetite favors equities 22
Trading16 hours ago

Dollar extends decline as risk appetite favors equities

By Stephen Culp NEW YORK (Reuters) – The dollar lost ground on Friday, extending Thursday’s decline as improved risk appetite...

Newsletters with Secrets & Analysis. Subscribe Now