Join the Community

23,578
Expert opinions
41,339
Total members
382
New members (last 30 days)
193
New opinions (last 30 days)
29,159
Total comments

Latest expert opinions

clear
clear

66 Results from 2020, /security

Vivek Anand Jeyaraj

Vivek Anand Jeyaraj Principal Product Manager at EdgeVerve Systems

Security 2020 - Fixing the link that risks breaking the chain

In 2015, two hackers, albeit in a controlled environment, hacked into a Jeep Cherokee through the entertainment system and disabled the transmission. This led to a recall of over 1.4 million vehicles to fix the vulnerabilities that made this attack possible. Today, many such devices, connected directly to the internet are used to pay tolls and also...

/security Information Security

Retired Member

Retired Member 

Harnessing Behavioural Biometrics

According to UK Finance, over two-thirds of British adults now use online banking, and 48% use mobile banking. This means financial institutions are under pressure to implement the latest identity verification technologies to protect the abundance of sensitive data, whilst delivering a seamless user experience. Current authentication methods are s...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How a Wi-Fi Hacker Snoops on Your Laptop and Mobile

You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins. Let’s imagine that you are in a...

/security

Doug Wick

Doug Wick VP, Products and Marketing at ALTR

From Banking and Data Security to Compliance: Blockchain Grows Well Beyond its Cryptocurrency Roots

Cryptocurrency and blockchain came to the forefront of our imaginations as a technological marriage, seen as a revolution, for digital transactions. So vivid was the future for this pairing, at the outset at least, that the terms became linked. In reality, cryptocurrencies and distributed ledger technologies are distinct, the latter supporting the...

/security Blockchain in Banking and Financial Services

Mike Kiser

Mike Kiser Senior Identity Strategist at SailPoint

When the Bill Comes Due: Securing Challenger Banks’ Growth

The moment of reckoning has come. A party of eight sit around a table, the white tablecloth strewn with the detritus of a communal meal. Coffee is slowly sipped as they contemplate how to divide the bill. Unlike in years past, this is a simple operation: mobile devices come out and money is rapidly exchanged as modern technology facilitates a mult...

/security Fintech

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Creating an Effective Business Continuity Plan

Most of us have no idea when a disaster is about to strike, and even if we do have a little warning, it’s very possible that things can go very wrong. This is where you can put a business continuity plan to good use. What does this do? It gives your business the best odds of success during any disaster. What Exactly is Business Continuity? Busines...

/security

Now Hiring