Join the Community

23,952
Expert opinions
40,652
Total members
395
New members (last 30 days)
206
New opinions (last 30 days)
29,262
Total comments

Latest expert opinions

clear
clear

2294 Results from /security

Eyal Worthalter

Eyal Worthalter Vice President – Global Solution Sales at Utimaco

Building security from the ground up to counter data breaches

This year has been hit hard by cyber-attacks, with many major companies experiencing compromission by hackers, such as Microsoft’s Exchange Server, and Australia’s Nine Network, which was taken off air. Most recently, a hacker stole $600m in cryptocurrencies from a blockchain finance platform in what could be the biggest hack ever, and T-Mobile ...

/security /crime Information Security

Retired Member

Retired Member 

Privacy and Cybersecurity are so boring, let's stop talking about it

Aha, it seems I have your attention. But don't you agree? For most people, privacy and cybersecurity are just boring topics. Even scary, with all the fearmongering and hoodie-pictures being used to represent cybercrime. Customer centricity and outcome-driven messaging clearly hasn't reached the majority of the cybersecurity world yet. People aren't...

/security /regulation

Pavlo Farb

Pavlo Farb Security Engineer at Cossack Labs

Cloud security and fintech: 4 things to consider

Check this list while planning a new business and putting your fintech app in the cloud. By noting these arguments you can avoid risky misconceptions of trusting too much responsibility to cloud providers and cloud environments. From our experience at Cossack Labs, we know that such an approach saves data, funds, and reputation. First, start with r...

/security /cloud Digital Banking Trends

Rick Goud

Rick Goud CIO at Zivver

5 reasons financial services must re-evaluate security training

Human error is the leading cause of data loss events; this is widely acknowledged today. It’s time to leverage technology to arm employees with the skills and knowledge they need to be your organisation’s greatest defence, rather than your weakest link. Accidental data leakages caused by people – emailing sensitive information to the wrong person, ...

/security /cloud

Retired Member

Retired Member 

“How can financial institutions protect against ransomware attacks?”

Ransomware on the rise: What are the risks? As financial technology becomes increasingly sophisticated and ubiquitous, so too do the risks of cybercrime. Financial institutions are prime targets for a litany of attacks including ransomware due to the vast quantities of critical value data (CVD) relating to its customers and employees. Ransomware ...

/security /crime Information Security

Ali El Kaafarani

Ali El Kaafarani CEO & Founder at PQShield

Why it’s time to wake up to the quantum threat

Quantum computing is proving to be enormously exciting for financial institutions. Already, Goldman Sachs and Deutsche Börse are exploring quantum algorithms to calculate risk model simulations 1,000 times faster than currently possible, while BBVA is looking to quantum to optimise investment portfolio management. But a more sinister aspect to...

/security /crime

Laura Francis

Laura Francis Head of Brand and Marketing at Form3

How microservices are changing the game for operational resilience and cyber security in payments

Cloud adoption among banks has accelerated exponentially in recent years with views now pivoting towards seeing cloud as central to resiliency challenges. Unlike cloud-based systems, legacy technology cannot be easily patched and upgraded. As a result, weaknesses can remain in a system for a significant stretch of time. It is not surprising that 6...

/security /payments The Payments Business

Pavlo Farb

Pavlo Farb Security Engineer at Cossack Labs

Why and where fintech uses crypto signed audit logs?

Lots of recently introduced regulations require audit logging as one of the measures for data protection in fintech. We know from practice that cryptographically signed audit logging can be a secure and pragmatic way to cover this point. Let's cut through complexity. Audit logs, or audit trails, capture evidence about any activity in your software...

/security /devops Fintech

Retired Member

Retired Member 

Cybercrime Turns on the Regulators

Cybercrime is rising across the board, and one of its top targets appears to be financial regulators. Financial services have long been on the front line of the fight against cybercrime. However, with attacks surging during the pandemic, that fight is becoming increasingly urgent. Regulators find themselves with the task of building capacity within...

/security /regulation

Retired Member

Retired Member 

The right way to implement 3DS2.2

Transitioning to 3DS2 entails many benefits when compared to 3DS1, such as frictionless flow, enhanced security, and improved mobile device compatibility. However, its implementation can be a cumbersome task, presenting numerous challenges. Therefore, it is important to be aware of such impediments and the solutions that can be adopted to address ...

/security /payments Frictionless Payments

Now Hiring