The Ultimate Cheat Sheet on Strong Authentication – Part 2
Posted on 14 April 2016 by
Part 2 of our strong authentication cheat sheet covers how one-time passwords are generated, what OATH authentication is, and more.
Posted on 14 April 2016 by
Part 2 of our strong authentication cheat sheet covers how one-time passwords are generated, what OATH authentication is, and more.
Posted on 17 December 2015 by
We’ve been talking about the future of payments for several years now and the evidence suggests that we’re already here. We take a look at what we think will happen next.
Posted on 23 April 2015 by
Much like good cakes, the best security solutions have layers. Efficient security policies don’t rely on a single technique. Instead, they integrate several complementary layers. In this post, we explain why this layered approach is needed for modern, digital banking.
Posted on 22 October 2014 by
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 12 September 2014 by
CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]
Posted on 05 June 2014 by
The UK’s National Crime Agency (NCA) is warning everyone to protect themselves against Cryptolocker and ZeuS malware before they both make inevitable returns to the web in less than two weeks. The NCA is working with the FBI and Europol in an effort to suppress the GameOverZeuS Trojan and the Cryptolocker ‘ransomware’ that encrypts victims’ […]