How to Mitigate the Risks and High Costs of Data Breaches. Part 2

This is the second installment of a multi-part series on the actual costs of data breaches and possible solutions that can be leveraged to protect your organization's data and bottom line.
Read more

Conclusions for PSD2 SCA

This article is part 7 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

FIDO2 for PSD2 SCA

This article is part 6 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Smartphone + Biometrics for PSD2 SCA

This article is part 5 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Europay, MasterCard, and Visa (EMV) Readers for PSD2 SCA

This article is part 4 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Hardware OTP for PSD2 SCA

This article is part 3 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

SMS OTP for PSD2 SCA

This article is part 2 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Direc...

This article introduces the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more