technology

Image for Banking Compliance – Testing and Monitoring: Open AI’s role in transforming the landscape: Interview with Fintech Expert Kinil Doshi

Technology

Banking Compliance – Testing and Monitoring: Open AI’s role in transforming the landscape: Interview with Fintech Expert Kinil Doshi

Image for Why Cybercriminals Favor the Financial Sector and how application security can help

Technology

Why Cybercriminals Favor the Financial Sector and how application security can help

Image for Will the Google Overview Problems Stop AI from Reaching the Finance Sector?

Technology

Will the Google Overview Problems Stop AI from Reaching the Finance Sector?

Image for Optimism, Scepticism and Guilt: Emerging trends in the application of Artificial Intelligence

Technology

Optimism, Scepticism and Guilt: Emerging trends in the application of Artificial Intelligence

Image for Transforming a Global Bank’s Customer Contact Centre Operations Through Maveric Systems’ AI-Powered Solution

Transforming a Global Bank’s Customer Contact Centre Operations Through Maveric Systems’ AI-Powered Solution

Date: June 28, 2024

Transforming a Global Bank’s Customer Contact Centre Operations Through Maveric Systems’ AI-Powered Solution By Kishan Sundar, Senior Vice President, Chief Technology Officer – Key Accounts, Maveric Systems Limited In the competitive banking landscape, customer service quality is a crucial differentiator. Poor customer service is the primary reason customers switch banks. Over 72% of customers expect...

Image for Compliance Constraints: Why the finance sector is unable to leverage GenAI

Compliance Constraints: Why the finance sector is unable to leverage GenAI

Date: June 28, 2024

Compliance Constraints: Why the finance sector is unable to leverage GenAI By James Sherlow, Systems Engineering Director, EMEA, Cequence Security We’ve seen generative AI (GenAI) deployed in the finance sector across numerous business use cases. It’s being used for document preparation, aggregation and analysis, in customer-facing processes such as through chatbots to alleviate loads on customer...

Image for Publishing and the Environment: Compassiviste Publishing Says Change Is Possible

Publishing and the Environment: Compassiviste Publishing Says Change Is Possible

Date: June 24, 2024

Publishing and the Environment: Compassiviste Publishing Says Change Is Possible In a cozy corner of a café, a reader flips through the pages of a hardback book, the scent of fresh ink mingling with the aroma of coffee. Across the room, another reader taps their tablet, diving into the world of an e-book, with every...

Image for Moving from embedded finance to embedded treasury: what does this mean for businesses?

Moving from embedded finance to embedded treasury: what does this mean for businesses?

Date: June 20, 2024

Moving from embedded finance to embedded treasury: what does this mean for businesses? Félix Grévy, VP Product, Open API and Connectivity at Kyriba There was a time when accessing financial services such as payments, lending, and investments depended on in-person visits to the bank or calling service centres and having to wait for the next...

Image for The Inspiring Journey of Mainak Mitra, Analytics and AI Lead, Driving Success for Data Platforms and AIML products

The Inspiring Journey of Mainak Mitra, Analytics and AI Lead, Driving Success for Data Platforms and AIML products

Date: June 10, 2024

The Inspiring Journey of Mainak Mitra, Analytics and AI Lead, Driving Success for Data Platforms and AIML products 10th June 2023 From humble beginnings to becoming a leading innovator in analytics and artificial intelligence (AI), Mainak Mitra’s career is a remarkable story of resilience, determination, and the pursuit of excellence. His journey, marked by significant...

Image for PCI DSS 4.0 Simplified: What You Need to Know

PCI DSS 4.0 Simplified: What You Need to Know

Date: June 5, 2024

PCI DSS 4.0 Simplified: What You Need to Know By Katie Paxton-Fear, API Security Researcher for Traceable AI Attackers are always looking for ways to take advantage of payment information and credit card information, which are among the most valuable data sets that a company has. Attackers frequently use this data directly on other websites,...