PSD2 requires European banks to provide communication interfaces to Third Party Providers (TPPs). These interfaces, generally referred to as APIs, will allow TPPs to build innovative financial services on top of the services provided by banks.
Download this white paper and learn about:
The PSD2 requirements for...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. Whether it's discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today's attack surface presents a growing challenge to CISOs looking to understand and reduce...
A leading mobile-based financial services company sought out fraud prevention tools. In the past, fraudsters used that company's customer accounts to funnel money via stolen identities. But with advanced device fingerprint technology, the company could detect multiple accounts created from the same device and suspend...
The hacking of an email account of a medical clinic employee during travels overseas demonstrates the risks posed to data when workers travel. Security experts offer insights on mitigating those risks.
How to Select, Implement and Succeed with Mobile Threat Defense
As more workplaces become 'everywhere' workplaces, cyber threats and attacks increasingly target mobile devices.
Through the eyes of many business leaders, opening a presentation or other document on a mobile device is hardly different from doing the...
Modern enterprise mobile security provides pre-emptive threat defense, runs on predictive intelligence and crowd wisdom, and delivers a noninvasive employee experience.
As the connected world becomes more connected by the day, cyber threats have been retooled to attack ubiquitous mobile endpoints. While attack...
A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.
A House committee that asked the healthcare sector for feedback on how to improve the cybersecurity of legacy medical devices has received some very strong opinions on the subject. Find out what commenters had to say.
The FDA should consider some sort of measuring stick when assessing a vendor's cybersecurity culture to determine if it qualifies for the agency's proposed fast-path program for premarket approval of "software as a medical device" products, some industry stakeholders say.
The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.
RSA's most recent Quarterly Fraud Report shows that "newsjacking" is increasingly empowering phishing attacks, says Angel Grant, RSA's director of identity fraud and risk intelligence. The report also shows a continuing surge in mobile app fraud.
How much progress has the healthcare sector made in the last 10 years addressing medical device cybersecurity issues? And what action is still needed? Ben Ransford, a principal researcher in a groundbreaking 2008 report about cardiac device cyber risks, offers his assessment.
Following reports about U.S. companies that enable government and other users to access real-time tracking information for all major U.S. wireless carriers' subscribers, provider Securus Technologies has reportedly been hacked, while LocationSmart has fixed a data-exposing flaw.
Banking and financial services customers today expect friction-free experiences no matter what device they're on, and regardless of whether they're at work, at home, or on the road. To succeed in the new digital era, it's critically important that you deliver seamless, personalized and omnichannel experiences for your...