{"id":298351,"date":"2025-05-02T06:41:03","date_gmt":"2025-05-02T06:41:03","guid":{"rendered":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-increasing-reliance-on-complex-technology-leaves-banks-vulnerable\/"},"modified":"2025-05-02T06:41:03","modified_gmt":"2025-05-02T06:41:03","slug":"rewrite-this-title-in-arabic-increasing-reliance-on-complex-technology-leaves-banks-vulnerable","status":"publish","type":"post","link":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-increasing-reliance-on-complex-technology-leaves-banks-vulnerable\/","title":{"rendered":"rewrite this title in Arabic Increasing reliance on complex technology leaves banks vulnerable"},"content":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic When Barclays experienced a three-day outage earlier this year, due to a mainframe failure, millions of UK customers were unable to access even the most basic banking services.The disruption not only damaged the bank\u2019s reputation but also left it facing a compensation bill of as much as \u00a37.5mn. Incidents like this are becoming alarmingly common in the financial services sector.Despite investing billions on state-of-the-art security tools and seeking to reassure both customers and regulators of their resilience, banks remain highly vulnerable. The increasing complexity of their software ecosystems and the long, tangled supply chains required to support them are key culprits. In the UK, Barclays suffered 33 system failures between January 2023 and February 2025, according to data from the House of Commons Treasury select committee. Over the same period, HSBC and Santander were both hit by 32 outages. The challenges are not limited to outages. Last year, Citigroup credited a client\u2019s account with $81tn when it meant to send only $280, after an employee at the Wall Street bank made an input error while using a backup system with a cumbersome user interface. \u201cBanks operate in complex environments that contain countless applications, ranging from trading platforms to fraud detection tools,\u2019\u2019 says Alois Reitbauer, chief technology strategist at US software group Dynatrace. \u2018\u2018These applications run on highly distributed cloud infrastructures, draw data from multiple stores, and rely on the support of a variety of third-party vendors\u201d.\u201cEven a minor miscalculation or anomaly across the software supply chain can lead to widespread outages that disrupt services,\u201d he adds.As financial institutions race to modernise \u2014 shifting to the cloud and adopting emerging technologies such as artificial intelligence and quantum computing \u2014 many remain hamstrung by so-called \u201ctechnical debt\u201d. The term is used to describe the mounting cost of maintaining and building on top of outdated, poorly written code, which is one of the key causes of flare-ups.\u201cThe recent errors from Barclays and Citigroup relate to legacy IT systems, likely developed during less mature development cycles. Having more rigorous development life cycles with proper vulnerability testing can help flag potential issues early on,\u201d says Justin Kuruvilla, chief cyber security strategist at Risk Ledger, a London-based supply chain security specialist. Alicja Cade, director of the office of the chief information security officer for Google Cloud, agrees. \u201cOften financial institutions grapple with legacy technology and obsolete processes, leading to operational fragility and simple errors when stretched by new demands,\u201d she says, adding that \u201cinsufficient testing in new contexts and overwhelmed interconnected systems further exacerbate these risks\u201d. A 2024 survey by 10x Banking of 200 IT decision makers found that 53 per cent cited data silos and production bottlenecks as barriers to scaling legacy systems. Tackling technical debt would also help banks improve security of their IT systems in the face of a growing cyber threat from both nation states and criminals looking to drain funds or steal data for extortion or espionage.But making large-scale changes to upgrade systems, as well as testing, can be costly and disruptive. Banks are reluctant to introduce downtime, particularly given the underlying \u201cconsumerisation\u201d of the financial user experience, according to Joshua McKenty, chief executive and co-founder of Polyguard. \u201cCustomers expect their mobile apps to be as convenient and instantaneous as Instagram or PayPal, and banks have had to scale up and scale out their application development and supporting IT operations,\u201d McKenty says. \u201cThe pressure of expectations for \u2018new features, faster, and for everyone,\u2019 and the increasing complexity of the financial operations banks offer, has spread security thin.\u201dTo keep pace, banks are increasingly outsourcing more of their IT systems to cloud service providers. Proponents argue that doing so offers opportunities to strengthen security, potentially allowing for automated updates, real-time global monitoring, and quicker remediation if there is an incident. But others disagree, pointing out that it can leave data more exposed in a centralised location. Jayant Dave, chief information security officer for Check Point Software Technologies in Asia Pacific and Japan, says the \u201cgrowing prevalence of hybrid architectures \u2014 spanning on-premises systems, cloud platforms, and mobile environments \u2014 adds layers of complexity.\u201dOrganisations lose certain control and visibility of their underlying infrastructure as the cloud provider takes on more responsibility. Julien Richard, vice-president of information security at Lastwall, points out that this can complicate processes around incident response and compliance.\u201cThe shared responsibility model \u2014 while well-documented \u2014 is still a source of confusion, especially in complex environments with multiple vendors and services. When something goes wrong, knowing exactly who is responsible for what isn\u2019t always clear, and that ambiguity can create real risk,\u201d he says.This makes third-party vendor due diligence, mapping and management all the more important. \u201cOrganisations need to establish clear processes for assessing the third parties they work with \u2014 not just at onboarding, but continuously over time \u2014 to ensure those relationships don\u2019t become blind spots,\u201d Richard adds. \u201cIn this exposed environment, financial services organisations must remember they\u2019re only as strong as their supply chain,\u201d says Alex Laurie, senior vice-president at Ping Identity.The realities of supply chain risk were highlighted by an incident in the tech sector last year, when a botched CrowdStrike update took down millions of Microsoft Windows PCs and servers in a global IT outage.\u201cOrganisations need to deploy controls that prevent both malicious acts and unintended errors, while also gathering the required telemetry to detect when a control has failed or been bypassed,\u201d says John Shier, field chief information security officer at Sophos. \u201cOverlapping sets of controls and detections, at different points in a process chain, provide redundancy and will reduce the impact of a single failure.\u201dSome security experts advocate for further automating systems, particularly given the advent of AI. Check Point\u2019s Dave urges financial groups to leverage AI to \u201caccelerate the modernisation of their technology stacks and workflows, reducing manual touchpoints and minimising human error\u201d. Reitbauer agrees, urging banks to shift from reactive to proactive approaches to IT outages or security incidents, using AI to help predict and prevent incidents before they occur. \u201cThe key lies in real time visibility into system health, user experience, and any anomalies in normal business processes,\u201d he says. Still, the headlong race by many financial services companies to introduce AI to their business without due care brings challenges in itself. \u201cAI fundamentally changes a bank\u2019s risk profile, introducing new vulnerabilities like model manipulation, demanding a strategic response,\u201d says Google Cloud\u2019s Cade. \u201cAs AI model usage is incorporated into critical infrastructure sectors, such as financial services, they are targeted by attackers, hence poorly secured or biased AI can lead to losses, penalties, and reputational damage,\u201d she adds. Banks should also think again about embracing the trend to push for greater deregulation, and should take as a cautionary tale the instability and breaches in the far less regulated cryptocurrency sector, according to Lastwall\u2019s Richard.\u201cMitigating these risks comes down to applying the fundamentals \u2014 strong policies, well-defined processes, empowered and informed people, and the principle of \u2018trust but verify\u2019,\u201d he says. \u201cWhat\u2019s crucial now is doubling down on those practices, not stepping away from them.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic When Barclays experienced a three-day outage earlier this year, due to a mainframe failure, millions of UK customers were unable to access even the most basic banking services.The disruption not only damaged the bank\u2019s reputation but also left it facing a compensation bill of<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":{"0":"post-298351","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-tech"},"_links":{"self":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/298351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/comments?post=298351"}],"version-history":[{"count":0,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/298351\/revisions"}],"wp:attachment":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/media?parent=298351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/categories?post=298351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/tags?post=298351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}