Security
News & Commentary
The Role of Big Data in Monitoring Real-Time Payments Fraud
Mike Urban, Director, Financial Crime Risk Management Solutions, Fiserv
Predictive and behavioral analytics hold the key to tracking fraud in a real-time payments environment.
By Mike Urban Director, Financial Crime Risk Management Solutions, Fiserv,
Comment2 comments  |  Read  |  Post a Comment
How to Ace RDC Compliance Audits
Jonathan Camhi, Associate Editor, Bank Systems and Technology
With annual RDC audits weighing heavily on banks, we offer some tips to help compliance officers get through the auditing season.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment1 Comment  |  Read  |  Post a Comment
Securing Networks in a BYOD-Enabled Environment
Jonathan Camhi, Associate Editor, Bank Systems and Technology
Bremer Bank turned to ForeScout CounterAct to achieve network security while providing ease of use for employees working on their mobile devices.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment2 comments  |  Read  |  Post a Comment
6 Reasons Secure Coding Can Still Lead to a Shipwreck
Brian Maccaba, CEO, Waratek
Why application security means more than just ensuring that developers are writing secure code.
By Brian Maccaba CEO, Waratek,
Comment10 comments  |  Read  |  Post a Comment
Liberty Reserve Deputy Pleads Guilty to Money Laundering
Jonathan Camhi, Associate Editor, Bank Systems and Technology
Regulators claim the virtual currency business acted as a bank for the global criminal underworld.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
Data Breaches: The True Cost
Bryan Yurcan, Associate Editor, Bank Systems and Technology
The costs of data breaches extend far beyond the information that was stolen.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
The True Cost of Data Breaches
Bryan Yurcan, Associate Editor, Bank Systems and Technology
The cost associated with data breaches extends far beyond just the information that was stolen.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment2 comments  |  Read  |  Post a Comment
Identity Management Will Get a Mobile Makeover by 2017, Part 2
Mike Strange, CTO, Mitek Systems
In the second part of this series, we look at how behavioral awareness and mobile imaging are changing authentication.
By Mike Strange CTO, Mitek Systems,
Comment0 comments  |  Read  |  Post a Comment
Increased Vigilance Needed to Reduce Counterfeit Risk
Bob Gibson, Vice President, Cummins Allison
With counterfeiting changing thanks to new digital technology, banks need to increase their detection capabilities.
By Bob Gibson Vice President, Cummins Allison,
Comment1 Comment  |  Read  |  Post a Comment
5 Questions About Faster Payments in the US
Bob Olson, Vice President, Global Financial Services, Unisys
US banks can learn lessons on implementation and security from other faster payments initiatives around the world.
By Bob Olson Vice President, Global Financial Services, Unisys,
Comment2 comments  |  Read  |  Post a Comment
A Privacy Checklist for Collecting Customer Information
Deena Coffman, CEO, IDT911 Consulting
Financial institutions collect tremendous amounts of customer information, some of it publicly available but much of it highly personal.
By Deena Coffman CEO, IDT911 Consulting,
Comment1 Comment  |  Read  |  Post a Comment
Are 10% of Mobile Depositors Fraudsters? No.
Lee Wetherington, Director of Strategic Insight, ProfitStars
Without context, numbers on mobile fraud can be misleading.
By Lee Wetherington Director of Strategic Insight, ProfitStars,
Comment2 comments  |  Read  |  Post a Comment
Network Security Concerns With BYOD
Ankur Chadda,
How banks can mitigate the risk of a network breach as BYOD policies become commonplace.
By Ankur Chadda ,
Comment7 comments  |  Read  |  Post a Comment
Staying Prepared for Cyber Attacks
Bryan Yurcan, Associate Editor, Bank Systems and Technology
FS-ISAC is running its fifth annual simulated cyber security exercise for financial institutions.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment2 comments  |  Read  |  Post a Comment
Is Wire Transfer Versioning Protecting Your Wires?
Wesley Wilhelm, Lead Fraud Subject Matter Expert, Risk & Fraud Management, NICE Actimize
Logging data for every change made to a wire transfer can enhance banks' ability to find fraudulent transactions.
By Wesley Wilhelm Lead Fraud Subject Matter Expert, Risk & Fraud Management, NICE Actimize,
Comment2 comments  |  Read  |  Post a Comment
Data Security: Consumers Trust Banks Over Retailers
Jonathan Camhi, Associate Editor, Bank Systems and Technology
A new ACI and Aite Group survey found that the majority of consumers trust banks more than retailers to keep their data private and secure.
By Jonathan Camhi Associate Editor, Bank Systems and Technology,
Comment9 comments  |  Read  |  Post a Comment
Real-Time Payments: Imagination Realized, Commerce Evolved
Paul McMeekin, Manager, Business Intelligence & Market Research, ACI Worldwide
Why the move to real-time payments may happen sooner than you think.
By Paul McMeekin Manager, Business Intelligence & Market Research, ACI Worldwide,
Comment3 comments  |  Read  |  Post a Comment
Top 3 Security Threats for Banks – And How to Address Them
Bill Carey, VP of Marketing at RoboForm
How can banks mitigate their biggest security risks in a rapidly changing fraud landscape?
By Bill Carey VP of Marketing at RoboForm,
Comment5 comments  |  Read  |  Post a Comment
Identity Management Will Get a Mobile Makeover by 2017
Mike Strange, CTO, Mitek Systems
In the first of a two-part series, we explore how mobile will change user authentication and risk management in financial services.
By Mike Strange CTO, Mitek Systems,
Comment11 comments  |  Read  |  Post a Comment
Where in the World Should Banks Store Their Data?
Matthew Porzio, Vice President of Product Marketing, Intralinks
Deciding where to house and how to move data involves understanding the relevant legal regimes and the application of risk analysis.
By Matthew Porzio Vice President of Product Marketing, Intralinks,
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Twitter Feed
PR Newswire
Register for Bank Systems & Technology Newsletters
White Papers
Current Issue
Bank Systems & Technology - August 2014
Modern core systems are emerging as the foundations of effective channel integration and customer engagement initiatives.
Slideshows