Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Thinkers always win, don't they? Industry leaders who think strategically and plan are more likely to achieve their goals. A product that meets user expectations, ensures safety of their assets and se...
By offering a wide range of advantages over traditional payment methods, financial wallet applications are becoming increasingly popular both among customers and fraudsters. Only in 2021 e-wallet loss...
NFC devices provide users with another pair of wings to fly over daily routines, as they enable quick and easy contactless mobile payments and the use of e-tickets, mobile digital wallets, keycards, e...
Once deployed, a lot of smart contracts cannot be easily changed. So, it would be wise to take a close look at potential weaknesses, exploits, and built-in mitigations when it’s not too late for chang...
You can often hear from me and my colleagues security engineers about the defense in depth approach to protecting the user data. Does this mean putting as many tools and security controls in your code...
One of the most common concerns security engineers hear sounds like “field level encryption is awesome, but alas we can not afford it because we will need to completely rewrite the code and encryption...
Switching from traditional software engineering to building modern cloud apps requires multiple changes on several levels, with data-related security often mistakenly pushed to the margins. But in fac...
One of the most important things you can do to make your fintech apps more secure is to let your developer team go beyond coding and get involved in security design and security operations including d...
Data security is an extremely complex industry. Even the most cutting edge applications, like blockchain and cryptocurrency wallets, are subject to “boring” data security threats. Especially because i...
Recently, after reading a great engineering blog post on OCSP and CRL verifiers in Go, and after further discussion in the community, I’ve got an insight that made me really gloomy. Mass of projects ...
In fintech, user’s data protection is among the top priorities requested by regulations, but surprisingly they are mapped onto real-world risks. As a data security engineer, I can say that while it m...
Check if you take these security points into consideration before you migrate to the cloud. While you move your infrastructure into the cloud (“lift and shift”), your security assumptions also go thr...