The Ultimate Guide to Credit Cards
Saturday, November 28, 2020

All articles tagged Security (28)

The U.S. Overseas Security Advisory Council Protects American Businesses and Private Entities Operating Abroad from Emerging Threats

The U.S. Overseas Security Advisory Council Protects American Businesses and Private Entities Operating Abroad from Emerging Threats

In a Nutshell: The rise of the COVID-19 global emergency highlights the importance of international cooperation and the role of governmental organizations in protecting the public. One such organization is the U.S. Overseas Security Advisory Council (OSAC), created in 1985 to establish a mechanism for regular communication between the public and private sectors concerning developments in overseas security. Information and analysis from OSAC analysts helps more than 5,000 constituent... read more »

Darktrace: An AI Cybersecurity Platform that Serves as the Immune System for Enterprise Business Data by Fighting Off Threats

Darktrace: An AI Cybersecurity Platform that Serves as the Immune System for Enterprise Business Data by Fighting Off Threats

In a Nutshell: Cyberthreats are more prevalent and advanced than ever, especially within the finance industry where trillions of dollars move around the world in complex infrastructures. Darktrace offers a whole new approach to cybersecurity with its Enterprise Immune System, which is modeled after the human immune system. Rather than expending effort on outdated perimeter security systems, Darktrace attacks threats quickly within the system with its Antigena solution. Meanwhile,... read more »

Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords

Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords

In a Nutshell: Anybody using a computer or mobile device has created a username or password at some point. For years, this has been the standard for online security and authentication, but experts say this approach is no longer sufficient. YubiKey, from Yubico, is a multifactor authentication product that boosts authentication security while maintaining convenience for its users. The YubiKey simply plugs into a USB port or uses near-field-communication technology for supported... read more »

Cryptomator Secures Sensitive Financial Data Using Cloud-Based, Open-Source Encryption that Works Across Platforms

Cryptomator Secures Sensitive Financial Data Using Cloud-Based, Open-Source Encryption that Works Across Platforms

In a Nutshell: Cryptomator is an affordable client-side data encryption solution that keeps valuable consumer data safe. The software securely stores informationthat users control in the cloud rather than on devices. And Cryptomator is more accessible than other solutions because its desktop version is free, and it only charges a small fee for using its mobile app. And even if a hacker accesses a user’s vault, Cryptomator’s encrypted files are useless without the proper key to... read more »

HYPR Authentication Platform Eliminates Passwords to Provide the Ultimate Security for Mobile-First Financial Enterprises

HYPR Authentication Platform Eliminates Passwords to Provide the Ultimate Security for Mobile-First Financial Enterprises

In a Nutshell: Large-scale security breaches are on the rise, leaving businesses vulnerable and in need of a security solution that will keep user information safe. Enter HYPR, a decentralized authentication platform that addresses the root problem of hacks — password storage. HYPR helps financial corporations such as Mastercard, secure user credentials by storing them safely on mobile devices. Providing one of the first true password-less security solutions, HYPR easily integrates... read more »

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data

In a Nutshell: Sensitive information is shared constantly in today’s connected world. That's why Microsoft’s homomorphic technology boosts security by enabling computations to take place on encrypted data, so it never needs to be decrypted, which opens it up to vulnerabilities. Now, Microsoft has released its easy-to-use Simple Encrypted Arithmetic Library (SEAL) for free use, and financial institutions are among the types of companies that can benefit most from this type of... read more »

Kingston Encrypted USB Drives: Hardware Data Protection for Today’s Mobile Workforce

Kingston Encrypted USB Drives: Hardware Data Protection for Today’s Mobile Workforce

In a Nutshell: Modern technology allows more workers to do their jobs on the go, but the devices they use to store and transfer data can expose businesses to significant breaches. Kingston Technology is well aware of the dangers posed by even the smallest hardware, and its line of encrypted USB devices protects both companies and their mobile workforces. As retailers continually heighten focus on cybersecurity, they need to stay informed on how to protect all points of data access.... read more »

Stay Ahead of Fraud — RSA® Analyzes Purchase Patterns to Help Retailers Detect & Respond to Potential Threats

Stay Ahead of Fraud — RSA® Analyzes Purchase Patterns to Help Retailers Detect & Respond to Potential Threats

In a Nutshell: Keeping pace with fraud is a tough challenge for retailers because cyber criminals are constantly looking for vulnerable access points to exploit. RSA works to lock cyber criminals out completely by offering businesses protection at every turn. RSA’s proprietary fraud prevention technologies use web session intelligence and behavioral analysis as a factor in determining whether a transaction may be fraudulent. By enlisting RSA, companies can also keep data and other... read more »

How to Get a Virtual Credit Card Number

How to Get a Virtual Credit Card Number

While the implementation of chipped EMV credit cards has eliminated a large portion of card-present (CP) fraud, the amount of card-not-present (CNP) — read: online — credit card fraud has steadily risen over the last few years. In an effort to combat CNP fraud, several card issuers and third-party companies have developed what are called virtual credit cards. Designed for use when shopping online, virtual credit cards are randomly generated, single-use credit card numbers... read more »

How StackPath’s Intelligent Machine Learning Protects Financial Institutions Against Cyberattacks

How StackPath’s Intelligent Machine Learning Protects Financial Institutions Against Cyberattacks

In a Nutshell:  Cybercrime and the theft of sensitive user data is on the rise, with attacks becoming larger and more frequent in recent years. The perpetrators of these attacks are increasingly well-funded, organized groups that earn millions of dollars from their criminal enterprise. With the stakes so high, it requires increasingly more sophisticated cybersecurity measures to prevent these thefts. StackPath is a platform of inherently secure edge services—including CDN, web... read more »

Blur from Privacy Company Abine Keeps Your Personal Financial Data Safe by Blocking an Average of 175,000 Online Trackers Annually

Blur from Privacy Company Abine Keeps Your Personal Financial Data Safe by Blocking an Average of 175,000 Online Trackers Annually

In a Nutshell: Any time you visit a website, companies you’ve never heard of use embedded trackers to collect information related to your browsing and purchase history, your interests, and other personal information you input into signup boxes or search engines. Data brokers use the information to categorize consumers and sell the data to outside agencies for marketing purposes. Abine created its Blur and DeleteMe security solutions to not only block the intrusion of trackers, but to... read more »

Entrust Datacard’s Unseen Security Layers Enable Digital Banking with Near-Zero-Factor Authentication

Entrust Datacard’s Unseen Security Layers Enable Digital Banking with Near-Zero-Factor Authentication

In a Nutshell: Financial customers are regularly treated to new technology and banking features that provide speed and convenience and make maintaining an account easier than ever. But with new services comes added hoops customers must jump through to prove their identity before accessing an account. Multi-factor authentication usually requires providing passwords, answering secret questions, supplying facial and fingerprint scanning, or typing in codes sent to an email or phone... read more »

AlienVault Unified Security Management Platform Provides Threat Detection and Response to Finserv Clients to Monitor and Manage Cyberthreats

AlienVault Unified Security Management Platform Provides Threat Detection and Response to Finserv Clients to Monitor and Manage Cyberthreats

In a Nutshell: An increase in sophisticated cyberattacks involving ransomware and malicious hacking is giving rise to the number of defense solutions available on the market. While businesses have many options to protect their networks, most require multiple products that work independently of each other instead of in unison. AlienVault’s Unified Security Management™ (USM) platform aims to provide essential capabilities within a single console. USM works within network, host, and... read more »

BeyondTrust’s PowerBroker Solutions Stop Privilege Abuse to Prevent Data Breaches and Protect Finserv Clients

BeyondTrust’s PowerBroker Solutions Stop Privilege Abuse to Prevent Data Breaches and Protect Finserv Clients

In a Nutshell: 2017 marked an all-time high number of data breaches, with 1,579 total incidents exposing more than 200 million consumer records. Nearly all of these breaches were caused by the vulnerability and exploitation of a network or stolen credentials that provided access to restricted areas. PowerBroker privileged access management solutions by BeyondTrust address nearly every vulnerability that cybercriminals look for. The solutions tackle password management, privilege... read more »

SCOTTeVEST’s Proprietary RFID Armor™ Material Adds a Hidden Functionality to Its Men’s and Women’s Clothing to Protect Your Credit Cards

SCOTTeVEST’s Proprietary RFID Armor™ Material Adds a Hidden Functionality to Its Men’s and Women’s Clothing to Protect Your Credit Cards

In a Nutshell: Radio frequency identification or RFID skimmers that thieves use to read and store information on a credit, debit, or passport card in a matter of seconds aren't yet as prevalent in the US as they are in Europe and other countries. That didn't stop SCOTTeVEST, a manufacturer of comfortable clothing with as many as 26 hidden pockets, from adding a pocket on certain vests, jackets, and hoodies lined with a proprietary RFID Armor material that blocks the 13.56 GHz... read more »

KeePass Earns Our Editor’s Choice™ Award as the Top Password Manager for Financial Apps & Services

KeePass Earns Our Editor’s Choice™ Award as the Top Password Manager for Financial Apps & Services

In a Nutshell: The average consumer has around 27 unique passwords they must remember to access important information like email, banking, brokerage, and credit card accounts. Many password vault programs exist on cloud technology that places control of your sensitive data in the hands of someone else's technology. KeePass uses the highest level of encryption security to store an unlimited number of passwords either online or offline with the use of a master password or security file.... read more »

The Bonita Platform from Bonitasoft Earns Our Editor’s Choice™ Award for Providing Finserv Dev Teams with Open-Source Tools to Create Engaging User Interfaces

The Bonita Platform from Bonitasoft Earns Our Editor’s Choice™ Award for Providing Finserv Dev Teams with Open-Source Tools to Create Engaging User Interfaces

In a Nutshell: Finserv companies across the globe are undergoing digital transformations that change the way customers and employees each engage with the business. A specialist in open-source business process management and digital transformation software, Bonitasoft provides free access to a limited version of its open-source development solution, Bonita. An annual subscription fee enables the full power of the recently released Bonita 7.6, used by Finserv companies to design... read more »

Arxan Keeps Mobile Banking and Payment Applications Safe with Security Solutions that Detect, Defend, and Deter Threats

Arxan Keeps Mobile Banking and Payment Applications Safe with Security Solutions that Detect, Defend, and Deter Threats

In a Nutshell: Traditional hacker attacks and viruses sought access to sensitive information on personal and business computers. But cybercriminals have shifted their attention to cellphone technology with the rise in mobile banking. Recent discoveries like the WPA2 Wi-Fi network vulnerability and the Janus Vulnerability for Android devices show that mobile application attacks are on the rise. To combat this trend, Arxan’s industry-leading mobile security solutions provide protection... read more »

Trustwave’s Value of Data Study Finds Major Variances on the Black Market Value of Critical Financial Information

Trustwave’s Value of Data Study Finds Major Variances on the Black Market Value of Critical Financial Information

In a Nutshell: Most consumers think of credit card information as the most valuable personal data to cyber thieves. But strategies put in place by card issuers to lock a credit card the instant fraud is suspected makes it a valuable commodity for only a brief period of time. A recent study by Trustwave found that medical records and personal identifiable information — like Social Security and driver’s license numbers, gender, race/ethnicity, and birth date — are more valuable... read more »

Balancing Consumer Privacy and Advertising: How the DAA Helps Both Sides Win

Balancing Consumer Privacy and Advertising: How the DAA Helps Both Sides Win

In a Nutshell: The internet has become our default tool for gathering information, maintaining social relationships, consuming entertainment, and for many of us, it’s enabling our livelihoods. But the idea that the internet is free is a myth. There is a cost to providing, maintaining, and delivering all of the information and tools we use, and that cost is borne by advertisers. In return, advertisers and their partners gather data about some of our online behavior in an effort to... read more »

18 Best EMV Chip Credit Cards with Security Technology

18 Best EMV Chip Credit Cards with Security Technology

I’m a history buff and hopelessly nostalgic. I’ve traveled cross-country to attend silent film festivals. My television automatically tunes to Turner Classic Movies at startup. I’ve been known to listen to a few vinyl records after a long day at work. Go ahead and judge me. That doesn’t mean I don’t like technology. My latest project is creating the smartest Smart Home on my block. New innovations have their place in our everyday lives, but a little refresher in the older... read more »

Cyren Answers the Financial Services Industry’s Call with Cloud-Based Security Solutions to Protect Sensitive Email and Web Data

Cyren Answers the Financial Services Industry’s Call with Cloud-Based Security Solutions to Protect Sensitive Email and Web Data

In a Nutshell: As a financial service provider, the way you handle your customers’ data is paramount. Billions of consumers have had their personal data compromised in massive data breaches, including those at Equifax and Yahoo!, which have brought the issue of privacy to the forefront yet again. Cyren is a cloud-based firm that offers email filtering and web security solutions to companies across the globe. Its continuously updated infrastructure handles nearly 2% of the world’s... read more »

How The PCI Security Standards Council® Lays the Groundwork for Safer Digital Payments

How The PCI Security Standards Council® Lays the Groundwork for Safer Digital Payments

In a Nutshell: When five of the world's largest credit card vendors combined their security programs into one in 2004, it created the Payment Card Industry Data Security Standard (PCI DSS). Not long after, it became clear that an organization was needed to manage constantly evolving PCI standards, and the Payment Card Industry Security Standards Council was born in 2006. Since its inception more than a decade ago, the Council has focused on reducing business owners' risk of cyber... read more »

How SaaS Platform Qualys® Helps Financial Institutions Maintain Transparency & Integrity with Its Integrated Security Solutions

How SaaS Platform Qualys® Helps Financial Institutions Maintain Transparency & Integrity with Its Integrated Security Solutions

In a Nutshell: With the continual evolution of online threats comes a constant need for more advanced forms of online protection. This is particularly true in the financial space, as the obligation to protect data is compounded by the fact that financial institutions have sensitive monetary transactions to protect to maintain customer confidence. The Qualys Cloud Platform works by not only scaling in real time to quickly respond to threats, but it allows users a "a single pane of... read more »

How Memset Keeps Financial Institutions Safe — Affordable Cloud Services Deliver Robust, High-End Security

How Memset Keeps Financial Institutions Safe — Affordable Cloud Services Deliver Robust, High-End Security

In a Nutshell: With customer data at stake, choosing a web host with a reputation for security is important for any financial institution. Memset is a UK-based host that offers best-in-class security for its customers. Using the latest technology and scalable service plans, Memset keeps financial data and other sensitive information secure in its cloud. The web host offers four main services at competitive rates to meet the needs of nearly any business. Boasting a 98% recommendation... read more »

12