Europay, MasterCard, and Visa (EMV) Readers for PSD2 SCA

By A. Khedron de León This article is part 4 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Hardware OTP for PSD2 SCA

By A. Khedron de León This article is part 3 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

SMS OTP for PSD2 SCA

By A. Khedron de León This article is part 2 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Direc...

By A. Khedron de León This article introduces the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

The Economics of FIDO

You might also like: It’s Time to Join Big Tech with FIDO2-based Strong Authentication (Five reasons to switch to switch to FIDO now) Ever heard of a PICNIC situation? It stands for Problem In Chair N...
Read more

Cloudy, with a Chance of Breaches

In an extremely short amount of time, the average person’s familiarity with and usage of the cloud has skyrocketed—both intentionally, and behind the scenes; you can even sip on a cup of coffee made v...
Read more

With Great Data Comes Great Responsibility

Corporations that store consumer data are implicitly given trust by consumers. This is a trust they must maintain or risk losing business accordingly. Proactive—not reactive—measures are the hallmarks...
Read more

The Case for FIDO2: The Most Secure Option on the Market

FIDO2 is the single most impressive piece of technology that can have an impact on human behavior and cybersecurity. Let’s get that out of the way. It’s a bold statement, but we’re going to tell you w...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Protecting COVID-19 Medical Data Using FIDO

In the world of cyber espionage, the law of supply and demand reigns supreme—so it shouldn't be a surprise that in our pandemic-stricken present, there's no hotter commodity on the current black marke...
Read more