The EU's second Payments Services Directive is alive and well. And although PSD2's Regulatory Technical Standards have technically been in place since September of this year, they won't actually be actively enforced or supervised for roughly one year. But where are financial institutions now re: compliance and...
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3-D Secure (also sometimes referred to as 3-D Secure 2.0) stand out? The big differentiator with EMV 3DS in emerging regulations and standards is that it's tied to law - not just recommendations.
Dowload...
What's a major challenge with combating cybercrime in 2020 and beyond?
Attackers launching a greater number of less-than-obvious attacks. This was the message delivered by Andy Bates of the Global Cyber Alliance at ISMG's London Cybersecurity Summit this past October.
"We think that one of the trends going forward...
Now more than ever, chief information security officers (CISOs) are expected to weigh in on board-level decisions. In an increasingly competitive landscape, business acumen has become just as important as technical know-how, and executives rely on the CISO to map security programs to business objectives to promote...
This survey is currently closed. Thank you.
An ever expanding attack surface, compounded by myriad connected devices is setting the stage for a whole new era of fraud in the financial services industry. Fraudsters continue to exploit the troves of PII available on the dark web to create fake credentials, with...
Opening an account digitally, either online or through a mobile device: It's how the vast majority of your customers want to start their relationship with you and it's where you want that relationship to begin. It's efficient, cost-effective, and a necessity in today's culture.
To address the aggressive adoption of...
This survey is currently closed. Thank you.
Today's cyber-attack landscape is increasingly complex, with digital transformation and multi-cloud providing new vectors for attacks on web, mobile and API based apps. The challenge for today's security professionals is mitigating these threats with ever more scarce...
Ransomware, business email compromises and the malicious insider threat: These are the three top concerns of Canadian attorney Imran Ahmad as he looks ahead to the cybersecurity legal landscape in 2020.
We caught up with Ahmad at our Toronto Cybersecurity Summit in September. Among the insights he shared: The rise of...
Armed with billions of stolen records, fraudsters create synthetic identities to apply for credit cards, loans, and other types of credit causing unprecedented losses to financial institutions.
Download this brief to find out how to block application fraud from the start.
The mobile and online channels are the future; being able to authenticate returning customers and determine who new applicants really are will be essential to successfully expanding product offerings in high-risk digital channels.
Download this whitepaper which explores:
How payment innovation is impacting fraud...
With consumers increasingly turning online to buy electronics, retailers stand to make significant gains in terms of eCommerce revenue. Unfortunately, growing online sales also raise the stakes on eCommerce fraud prevention. This report sheds light on consumer electronics online fraud patterns in, offering retailers...
As breaches become more commonplace in India, law enforcement agencies are leveraging new technologies to assist in investigations. This edition of CyberEd APAC features an interview with Brijesh Singh, inspector general of police for cyber in Maharashtra, who outlines the challenges in investigating breaches and the...
Great Rail Journeys is the UK's leading seller of holidays by rail, making it easy for customers to browse and book trips online. But as they were actively expanding their customer base internationally to North America, with the ultimate goal of delivering services globally, they recognized a few technical challenges,...
With new threats targeting the nation's critical infrastructure, partnerships among government and private-sector security professionals are more critical than ever, says Brian Harrell of the U.S. Cybersecurity and
Infrastructure Security Agency. Harrell was a featured speaker at ISMG's recent Cybersecurity Summit in...
One of the main goals of PSD2 is to provide consumers with better service, both in terms of user experience and security. PSD2 was developed with consumers in mind. It is intended to enhance transparency and improve the customer experience while lowering costs through competition.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing paymentsecurity.io, you agree to our use of cookies.