All Posts (6456)

Sort by

Many option strategies are designed to create profit potential and also reduce risk. If you are willing to accept a limited level of both profit and risk, many spreads will do the trick. But these strategies are complex, and might not be worthwhile, given transaction costs and the need to monitor positions constantly. One solution is found in the box spread.

Spreads can be broadly defined as bull or bear. Either may be constructed using calls or puts. In a box spread, you combine bull and bear sp

Read more…
Views: 252
Comments: 0

Options: Gamma Trading Strategies

Gamma confuses some options traders because it's a "secondary" indicator. It measures the speed of change in another indicator, delta.

Delta measures the rate of premium change in the options related to changes in the underlying (and of course is affected by time and proximity). Gamma measures how quickly delta moves. It tracks delta and reflects changing volatility, so looking at delta and gamma together is a great way to compare volatility between two or more issues.

Delta is measured with a sin

Read more…
Views: 55
Comments: 0

DC Murders as horrific as it gets

The latest report says that Darron Dellon Dennis Wint did not act alone in the arson murder of a Washington, D.C., family and their housekeeper. You might wonder how a $4.5 million mansion—presumably with top-flight smoke alarms—could burn enough to kill the occupants.

A cnn.com report says they were held against their will since the day prior to the May 14 fire. Wint is being held without bond.

It’s too soon, however, to draw conclusions, as other people are being interviewed by police.

Wint was a

Read more…

Short Call Condor Basics

The short call is an intriguing position to open, if only because so many traders see it as way too risky to even consider. But some strategies are perfectly suited to take advantage of two great short call features: offset of risk, and premium income.

One variation is the short call butterfly, which employs three strikes. An expansion of this which adds even greater risk spreading is the short call condor. This expands the butterfly by adding another mid-range strike. Thus, there are four strike

Read more…
Views: 64
Comments: 0

Connecting the Dots: A Cyber Detective Story

Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these thing

Read more…

The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.

Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no

Read more…

Social Media Scams on the rise

Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands, the funny thing is that they continue posting personal information—way too personal.

The FBI’s Internet Crime Complaint Center says that social media is a fertile area for criminals to scam people.

Phishing

You are lured to a phony website that masquerades as your bank or so

Read more…

How to Recognize a Phishing Scam

So someone comes up to you in a restaurant—a complete stranger—and asks to look at your driver’s license. What do you do? Show it to that person? You’d have to be one loony tune to do that.

However, this same blindness to security occurs all the time when a person is tricked by a “phishing” e-mail into typing in the password and username for their bank, or it may be the login credentials for their PayPal account or health plan carrier.

Phishing e-mails are a favorite scam of cyber criminals. THEY

Read more…

When you write covered calls, you produce greater profits by writing six two-month covered calls per year, than you will realize writing one 12-month covered call per year. Time decay for further-out options is quite slow, so writing options more than few months away is equal to lost time. Based solely on option profits, focusing on short-term ATM or OTM contracts produces annualized double-digit returns.

An example of the covered call and how to identify profit, loss and breakeven points: You pu

Read more…
Views: 72
Comments: 0

Recently I got a puppy for my child. We decided to name the puppy 4wgu23x5#9. My wife,8yysH3m, thought we should name the dog 0x2%#b5. But I’m sure she’ll get over it. Meanwhile, I’m helping my older child with setting up a few social media accounts, and I suggested the two passwords: Rover and Spot.

Is there something wrong with this picture?

Of course! But this picture replays itself millions of times over all the time, as people name their passwords after their pets, family members or favorite

Read more…

Craigslist encounter ends very badly

At least one woman is happy that her driver drove like a drunk. That’s because his erratic driving caught the attention of troopers who pulled him over. They then heard a woman calling for help—from the backseat. She was bound and gagged with a bag over her head.

The 41-year-old man had posted an ad on Craigslist; he wanted a submissive partner. His phony profile attracted the 22-year-old woman (who I must wonder, why would she be interested in a man who wants a submissive partner? Doesn’t this s

Read more…

The absolute must for air travel is aviation safety. Proof of the seriousness in addressing the issue of aviation safety is the fact that the US has been taking steps to bring standards to improve aviation safety from almost the very beginning of commercialization of air travel. Aviation being the kind of activity that it is; aviation safety has to be so comprehensive that it should take into consideration all the possible factors that could contribute to a lack of it. This makes aviation safety

Read more…

A core aspect of hygiene in any healthcare setting is the aspect pertaining to environmental cleaning.  A proper environmental cleaning program should consist of a plan in which the healthcare unit ensures that the possibility of risk of infection is minimized. Prevention of infection is the main purpose of environmental cleaning. This is because hospitals are a very likely source of infections, given that people with almost all kinds of contagious diseases visit or stay in them. Since hospitals

Read more…

I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.

saupload_aaabookmarkanotext_thumb1.jpg       The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.

This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, f

Read more…
Views: 49
Comments: 0

Fear and Bravado in Decision Making

I was reading an article by Ross Gittins in the Sydney Morning Herald the other day. He was discussing how the media is driving us to believe the world is in much worse shape than it actually is. As he explained, we are programmed to check for threats to our well-being and hence the news we are most drawn to is the bad news. Consequently, the media has found the easiest way to keep their distribution and website statistics up is to feed us plenty of bad news stories. Hence the “fear factor” heav

Read more…
Views: 64
Comments: 0

The King of Atlantis! The Protector of the Seas and Oceans! A beloved member of the Justice League! It’s none other than Aquaman! While he is most well-known for his ability to control marine animals and breathing underwater, he is also the superhero who poses the biggest threat to you online, according to Intel Security’s list of Most Toxic Superheroes.

Superhero movies and television shows are booming like never before. They have been resurrected and reinvented with the new and improved costume

Read more…

8028235478?profile=original

Enrique Suarez Presenting:

WikiLeaks Email Release Reveals Hacking by Governments Worldwide

Source:
Global Research, July 13, 2015

WikiLeaks last week published more than one million emails from the Italian surveillance malware vendor Hacking Team, shedding further light on the extent of the spying being conducted by governments around the world against their populations.

Emails in the searchable database disclose the company’s negotiations with intelligence and polic

Read more…

ERM Software in Action

Conflicted-Direction-Maze-289x300.jpg?width=215As discussed in part 1 of this blog series, many businesses do not formally recognize their critical risk networks. Without proper acknowledgment, fundamental risks remain essentially invisible. That being said, it’s vital to create conditions that enable a useful risk management network to be formed and used across the enterprise. So, how does this “right” network of problem solvers form?

Relatively routine problems can be solved by rapidly created, temporary teams that are

Read more…
Views: 56
Comments: 0

I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.

The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.

This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, for exam

Read more…
Views: 46
Comments: 0

Benefits of the Covered Call

saupload_options-conservative.jpg

Benefits of the covered call include generation of income without added market risk. The comparison between the covered call and simply owning shares of stock demonstrates that added covered call income discounts the basis in stock, thus reducing market risk.

There are two criticisms of the covered call. First, if the underlying price declines below the discounted basis in stock (stock reduced by option premium), the overall position loses. However, if you own shares prior to opening the covered

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead