• Jeff Wixted
    Jeff Wixted Mar 19, 2018

    Your gold mettle moment: How to stop fraudsters from stealing the spotlight at worldwide events

    Showcase contests not only attract the eyes of the world but the hands of thieves as well. Enter your four-point game plan.

    Read More
  • Document security for improved compliance

    Chris Strammiello Jun 24, 2015

    Only a loan origination system combining user authentication and authorization, encryption, destination and output controls and audit trails can assure the integrity of customer information.

    Read More
  • Managing tokenization directories

    Kate Knudsen Apr 22, 2015

    When deciding on an approach to tokenization, financial institutions need to choose between network- or issuer-managed directory services, or both.

    Read More
  • Behavioral analytics for detecting fraud

    Craig Priess Mar 18, 2015

    As bankers grapple with fighting off fraudsters who seek to steal the identities of their customers, they should consider behavioral analytics as a useful weapon in that battle.

    Read More
  • Bolstering defenses against cyber attack

    Aaron Scicluna Feb 11, 2015

    Responding to data breaches requires that financial institutions implement a proactive vulnerability management plan and basic security protocols such as network segmentation.

    Read More
  • Responding proactively to cyber threats

    Ajay Patel Jan 7, 2015

    To ward off cyber fraud, banks need to deploy proactive detection systems, give the chief information security officer enterprise-wide authority and improve customer education.

    Read More
  • Credentialing customers for security

    Sean Trundy Dec 17, 2014

    Credentialing customers via biometrics offers banks a way to improve security for customers while increasing their own market share.

    Read More
  • Protecting Vital Customer Information

    Mark Hickman
    Mark Hickman Nov 24, 2014

    Protecting a customer’s vital financial information requires that financial institutions encrypt and track the flow of that data.

    Read More