Michael P. Magrath
Taxpayer First Act: Improving identity verification and modernizing the IRS
With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.
How Organizations Can Build Trust And Security Through Digital Identities
Identity and access management (IAM) solutions form an important part of the digital experience - and interestingly, customers aren’t too excited about it. By verifying users, a large number of platforms are able to boost trust, reduce fraudulent activities, increase sales and revenue.
FCA and UK Finance expected to delay SCA
The Financial Conduct Authority (FCA) is set to delay enforcement of the Strong Customer Authentication (SCA) payment security rules by than 18 months, on the recommendation of UK Finance.
Why Modern Identity Verification is Crucial in Today’s Threat Landscape
Capital One Hack – The Industry Reacts
Over 100 million people affected in Capital One’s breach, 147 million in Equifax – two of the biggest in an ever-growing line-up of attacks through web application firewalls that are used to protect consumer-facing apps. Here, Eyal Wachsman, CEO of Cymulate and Will LaSala of OneSpan share their insights…
Nationalizing a New York reg could combat Capital One-style breaches
The Capital One breach is a classic example of the “insider threat” that has been present since the first merchant hung a shingle and sold goods, and is certainly not limited to the digital age.
Visa Vulnerability Discovered by Positive Technologies Researchers
Positive Technologies has today announced that researchers Leigh-Anne Galloway and Timur Yunusov have discovered flaws that allow hackers to bypass the payment limits on Visa contactless cards.
Karen Epper Hoffman
Why vendor security matters to your bank
Today’s fraudsters may choose to attack a community bank’s digital platforms or physical branches and ATMs. But what happens when a cybersecurity vendor isn’t well versed in physical security, or vice versa?
A Realistic Path Forward for Security Orchestration and Automation
Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.