Join the Community

23,585
Expert opinions
41,339
Total members
371
New members (last 30 days)
195
New opinions (last 30 days)
29,160
Total comments

Latest expert opinions

clear
clear

66 Results from 2020, /security

Retired Member

Retired Member 

Intro to Decentralized Identity Technology: How Does Blockchain Cryptography Work?

Types of blockchains The most commonly talked about feature of blockchain is that it is decentralized, meaning that there is no single organization or individual in control of all the information. In 2017, as blockchain gained a lot of media attention, critics focused on the public aspect of the platform and said that everybody could see transacti...

/security /identity

Hugo Chamberlain

Hugo Chamberlain Chief Commercial Officer at smartKYC

Why Showing Your Workings is Essential for Trusted AI and KYC

The concept of artificial intelligence (AI) has been in our collective consciousness for decades, mainly due to far-fetched Hollywood depictions of AI-powered killer Terminators, i-Robots and Replicants. These fictional portrayals, twinned with outspoken views from technology titans like Elon Musk and Professor Stephen Hawking, have led to some ...

/security Artificial Intelligence and Financial Services

John Cragg

John Cragg Chief Executive Officer at MYHSM

So, you want to operate your own data centre?

If you are going to build a data centre to handle activities such as card issuance and payment transaction processing, then that data centre will need to meet the requirements of one or more Payment Card Industry (PCI) security standards. PCI DSS PCI Data Security Standard (DSS) is applicable to data centres that process or handle cardholder data...

/security /regulation Fintech

Retired Member

Retired Member 

Why the world needs PIN

Technology is a great enabler. It brings enormous possibilities in customer experience and product innovation, but it also brings new levels of sophistication in the activities of fraudsters. In the payments landscape, the need to ensure the security of transactions to protect consumers and merchants is as critical as ever. Imagine then, a world w...

/security /payments Fintech

Retired Member

Retired Member 

Data Breaches: How We Got to Where We Are Now

Introduction Data breaches have been escalating out of control in recent years. Not even top companies can prevent massive hacks and account takeovers of their customers. No industry is immune either, as this pestilence has been wreaking havoc across the board. So why is this happening? Simply because data breaches have become so easy to do and so ...

/security /identity Fintech

Yo McDonald

Yo McDonald Vice President, GRC Solutions at MetricStream, Inc.

How cybersecurity teams use Risk Quantification to remain vigilant in a post-pandemic digital world

As soon as the severity of the COVID-19 outbreak was recognised by world leaders, a widescale shift to remote working for many office workers rapidly increased the pressure on cybersecurity teams. Before entering this “new normal” in 2020, most cybersecurity teams would typically have been used to guarding an organisation’s infrastructure, analysin...

/security /covid-19 Financial Risk Management

Retired Member

Retired Member 

Vendor Assessments Meet Location Risk

As global supply chains become increasingly complex, it is more important than ever to incorporate location risk into your vendor risk assessment process. From the outset, it is critical to define risk appetite and risk treatment strategy based on location when considering third-party portfolios. Depending on the nature of service, such considerati...

/security /regulation

Eugene Rudenko

Eugene Rudenko Marketing manager at Aetsoft

How Should Alternative Lenders Combat Emerging Forms of Fraud?

Among the lending firms that fall victim to hacker attacks, mid-large ones surprisingly become the primary targets. LexisNexis reports that only last year, 2,000 mid-large financial services firms and over 1,500 loan vendors suffered from hackers each month. For smaller companies, the figures are more modest: 1,000 and 640 monthly attacks, respect...

/security /payments Trends in Financial Services

Amita Choudhary

Amita Choudhary Marketing Manager at Princeton Growth Accelerator

How to Meet Finance Industry Security Standards when Migrating to Office 365

Migrating large databases is never an easy task, especially when it touches more sensitive data like financial records. E-mails are no exception to this, and Office 365 migration can be a messy process if you don’t approach it correctly. There are many tools on the market that can help you streamline the job and get things done faster, and it’s a g...

/security Information Security

Retired Member

Retired Member 

Why PSPs must do more to boost social-media payments

Purchasing items on social media is a growing international trend with huge potential. During the COVID-19 crisis, 42% of people in an international Global Web Index survey reported spending a greater amount of time on the likes of Facebook and Instagram. And with social distancing continuing for months, that trend is likely to continue. Accordin...

/security /payments The future of Payments in Europe

Now Hiring