3 min read
EBA On Customer Authentication Under PSD2: Possession & Knowledge
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
3 min read
Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations.
3 min read
Credit cardholders are generally protected from liability if unauthorized transactions are made with their credit cards because of consumer...
3 min read
This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses....
5 min read
When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...
3 min read
Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...
7 min read
Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...
4 min read
An interesting case arose in the state of California this year regarding a bankruptcy lawyer who utilized DocuSign for many official legal documents.
3 min read
On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...