security

Image for How biometrics provides retailers security, trust and competitive advantageTechnology

How Biometrics Provides Retailers Security, Trust and Competitive Advantage

Image for Digital Identity Solutions – Building Trust in the Banking SectorTechnology

Digital Identity Solutions – Building Trust in the Banking Sector

Image for Russian threat to Baltic security rising – Estonian intelligence reportTop Stories

Russian Threat to Baltic Security Rising – Estonian Intelligence Report

Image for Make sure testing keeps up with mobile app evolutionTechnology

Make Sure Testing Keeps up With Mobile App Evolution

Image for The Importance of Browser Security in Financial Institutions

The Importance of Browser Security in Financial Institutions

Date: February 1, 2023

By Alon Levin, VP of Product Management at Seraphic Security Once upon a time, financial institutions had to deal with criminals like John Dillinger, Bonnie (Parker) and Clyde (Darrow), and Valerio Viccei who committed crimes worthy of—and sometimes depicted in—Hollywood movies. While the threats facing the average financial institution are less sensational than the Knightsbridge...

Image for FIDO2 for financial sector: Pros&Cons

FIDO2 for Financial Sector: Pros&Cons

Date: January 25, 2023

By Dr. Pavel Melnichenko, CTO & co-founder of Airome Technologies How simple is it in reality? FIDO2 is a remarkable project that has been driven by IT industry giants all over the world for several years now. Describing what exactly the project is in a concise manner is rather difficult since the FIDO Alliance (the...

Image for The software composition analysis market: Trends and opportunities

The Software Composition Analysis Market: Trends and Opportunities

Date: January 24, 2023

What is software composition analysis? Software composition analysis (SCA) is a process of analyzing the third-party libraries and open-source components that are included in a software application. It is designed to identify any vulnerabilities, licenses, or security issues that may be present in these components. SCA is typically performed as part of the software development...

Image for Japan, UK to sign reciprocal access agreement for military officers -Yomiuri

Japan, UK to Sign Reciprocal Access Agreement for Military Officers -Yomiuri

Date: January 6, 2023

TOKYO (Reuters) – Japan’s Prime Minister Fumio Kishida will sign a reciprocal access agreement for military officers with British counterpart Rishi Sunak next week, the Yomiuri newspaper reported on Friday. The agreement, which relaxes immigration controls for military officers, aims to strengthen security ties between the two countries to counter rising threats from Russia and...

Image for Top tips for Avoiding Bank Account Scams in 2023

Top Tips for Avoiding Bank Account Scams in 2023

Date: January 4, 2023

By Gemma Staite, Threat Analytics Lead at BioCatch Record levels of fraud are being dealt with in the financial services industry. In comparison to the offences committed in 2018, there has been a 151% increase in fraud in 2022, according to a recent UK Finance report. The upcoming “scampocalypse” is being caused mostly by two things....

Image for The Authentication Conundrum

The Authentication Conundrum

Date: January 4, 2023

By John Ferguson, Chief Risk Officer at Cashfac, and Rob Griffin, CEO at MIRACL The modern business landscape, to cybercriminals at least, is a land of opportunity. At every turn, paths lead to low hanging fruit, easy pickings, and most tempting of all, the gold at the end of the rainbow. To cybercriminals, financial services and fintech...