Instigate change. Start a new collaborative Blog Group

Create group
Blogs
René Hendrikse

Here’s why (and how) the world should remove the need for passwords

Are you a good password user? If you have different passwords for every account, each a unique configuration of letters, numbers, capitals, and symbols, perhaps you are. No one can access your account...

06 Jul 2022
Information Security
Caris Jackson

During this War on Fraud, Armour Up and Bring Your Shield

As a society we cannot seem to catch a break. We have had the relief of coming out of a global pandemic and various lockdowns. But now we have a cost-of-living crisis, a recession looming, and are fac...

06 Jul 2022
Kevin Eley

Detecting and Responding to Threats Fast: Building a SOC with Limited Resources

Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure as a result of this. Org...

01 Jul 2022
Business
Michel Roig

Biometric payment cards: Benefits, misconceptions, and future adoption

Adoption of biometric payment cards is increasing across the globe, and there are many reasons for this. Let’s start with regulatory compliance and enhanced security. The recently imposed Strong Cust...

29 Jun 2022
Biometrics
Steve Bradford

Out of office, home and away, moving up, moving on; when security goes AWOL

The financial services industry has one of the highest rates of insider data breaches, costing on average $21.25 million in the past year alone. Whether it’s an employee acting with malicious intent,...

28 Jun 2022
Banking Strategy, Digital and Transformation
A Finextra Member

Banking on Ad Fraud Prevention and Growing High-Street Accounts

Over the past few years, the banking and financial services landscape has transformed massively. Where once the large conglomerates and legacy banks dominated the industry, the rise of ‘Challenger Ban...

22 Jun 2022
Marketing in Financial Services
Jim Steven

Why consumers need to be at the heart of your crisis response plan

Consumers must be at the heart of any crisis response plan. When any business is hit by a crisis, it sends shockwaves throughout the organisation. The impacts of a cyber-attack, health emergency or da...

22 Jun 2022
Data Management and Governance
Pavlo Farb

Application security in cryptocurrency ecosystem

You can often hear from me and my colleagues security engineers about the defense in depth approach to protecting the user data. Does this mean putting as many tools and security controls in your code...

07 Jun 2022
Fintech
Shagun Varshney

How to take ownership of SCA by understanding Authentication vs. Authorisation

Along with the added security that the newly enforced Strong Customer Authentication (SCA) introduced for online retailers in the UK comes added complications when determining the most efficient and c...

06 Jun 2022
Hash Choudhuri

Observability: The next phase in the evolution of data monitoring and breach investigations

The pivot by many banking and financial firms to digital by default over the past few years has played out against a huge surge in cybercrime, with the pandemic creating a perfect storm for new method...

10 May 2022
Data Management and Governance
Pavlo Farb

Field level encryption and apps’ re-engineering

One of the most common concerns security engineers hear sounds like “field level encryption is awesome, but alas we can not afford it because we will need to completely rewrite the code and encryption...

04 May 2022
Fintech
Liudas Kanapienis

Is your business exposed to Ukraine sanctions penalties?

Any business is now liable for sanctions violation penalties - not just financial institutions Sanctions compliance used to be primarily a worry for financial institutions. However, Russia’s invasion ...

03 May 2022

Now hiring