Yonathan Klijnsma, RiskIQ

How To Avoid Online Card-Skimming (Interview with Yonathan Klijnsma, RiskIQ)

| | browser, Finance, Malware, security
Hear how consumers can avoid online payment card-skimming (Magecart), in this interview with Yonathan Klijnsma of RiskIQ.The post How To Avoid Online Card-Skimming (Interview with Yonathan Klijnsma, RiskIQ) appeared first on Defending ...
Winning the Data Game – Banks must view FinTech and data security as stepping stones not obstacles

Winning the Data Game – Banks must view FinTech and data security as stepping stones not obstacles

Data security and privacy by design in FinTech will produce a positive-sum game, it’s a win-win for banks and customers.The post Winning the Data Game – Banks must view FinTech and data ...
How to (better) implement secure APIs in an Open Banking Partnership – Part Two

How to (better) implement secure APIs in an Open Banking Partnership – Part Two

Take a closer look at the reference architecture of APIs for Open Banking and how financial institutions and FinTechs can safely share data.The post How to (better) implement secure APIs in an ...
How to (better) Secure APIs in an Open Banking Partnership – Part One

How to (better) Secure APIs in an Open Banking Partnership – Part One

| | Finance, Privacy, regulation, Trust
By going one step further than authentication and verification to find and protect private information itself – at rest, in transit and in use – financial institutions can be data-first in their ...

How Secure Are Digital Wallets and Mobile Payments (Apple Pay, Google Pay, Samsung Pay, PayPal, etc.)?

| | Finance, security
How safe are Apple Pay, Google Pay, PayPal, and other digital wallets and mobile payments? Learn how their security compares to credit cards and other traditional payment methods ...
“Cyber Attack Survival Manual” (Book Summary)

“Cyber Attack Survival Manual” (Book Summary)

Personal cybersecurity and privacy advice from the book "Cyber Attack Survival Manual." ...
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Step-by-step personal cybersecurity guidance from the book "Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals" by Bart R. McDonough ...
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Book Summary)

Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Book Summary)

Tips on minimizing your risk of identity theft from the book "Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves" by Adam Levin ...

Which Passwords to Change After Credit Card Fraud

| | Finance, passwords, security
Which passwords should you change after credit card fraud? Get the answers ...
Facebook

The Shared Security Weekly Blaze – Facebook and your Financial Transactions, Smart Home Security, Critical HP Printer Vulnerabilities

This is the Shared Security Weekly Blaze for August 13, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
Loading...