Hardware OTP for PSD2 SCA

This article is part 3 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

SMS OTP for PSD2 SCA

This article is part 2 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Direc...

This article introduces the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

The Economics of FIDO

You might also like: It’s Time to Join Big Tech with FIDO2-based Strong Authentication (Five reasons to switch to switch to FIDO now) Ever heard of a PICNIC situation? It stands for Problem In Chair N...
Read more

With Great Data Comes Great Responsibility

Corporations that store consumer data are implicitly given trust by consumers. This is a trust they must maintain or risk losing business accordingly. Proactive—not reactive—measures are the hallmarks...
Read more

Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

Voice of the Future

HELLO, COMPUTER? The landscape around payments processing is a convoluted, pockmarked patchwork with hazy bogs of uncertainty parked right beside towering bastions of safety and confidence. Increasing...
Read more

FIDO 201: Moving beyond PKI and PIV Card Authentication with PKI2FIDO

If you're new to the world of the FIDO Alliance, we recommend reading our FIDO 101 article, and our in-depth guide to FIDO Protocols.
Read more

It’s Time to Join Big Tech with FIDO2-based Strong Authentication

You might also like: The Case for FIDO2: The Most Secure Option on the Market We live in perilous times, both with regards to our personal health and our online security. Similar to physical viruses l...
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more