Slide background

The Entersekt blog.

Industry news, security threats, and technology advances in consumer authentication
Five things you’ve been reading on the Entersekt blog posts

Five things you’ve been reading on the Entersekt blog posts


As we approach the end of the year, we looked back to see which of our blogs our readers enjoyed the most. From digital wealth management security, to inspiring customer trust, to friendly friction (yes, there is such a thing), and even evolution, the vast array of topics covered by our contributors surprised even us.

Read More ...

Snippet: As we increasingly move our lives online, it is no surprise that fraud should be following us. The rise of ecommerce and digital banking has resulted in growing levels of fraud targeting these new business channels. In this blog post, London-based analyst Alan Goode investigates what is currently happening in the UK.

As we increasingly move our lives online, it is no surprise that fraud should be following us. The rise of ecommerce and digital banking has resulted in growing levels of fraud targeting these new business channels. In this blog post, London-based analyst Alan Goode investigates what is currently happening in the UK.

Snippet: Durch PSD2 wird es zu einer ganz neuen Marktdynamik kommen. Einerseits müssen sich Banken auf Belastungen durch neue Compliance-Anforderungen und erweiterte Haftungsrisiken einstellen, andererseits entstehen durch das regulatorische Rahmenwerk auch neue Umsatzchancen.

Durch PSD2 wird es zu einer ganz neuen Marktdynamik kommen. Einerseits müssen sich Banken auf Belastungen durch neue Compliance-Anforderungen und erweiterte Haftungsrisiken einstellen, andererseits entstehen durch das regulatorische Rahmenwerk auch neue Umsatzchancen.

Snippet: Selecting an authentication solution is no different. We should be asking ourselves: what is the customer’s need, and how can we best meet that? What does a customer-focused, secure authentication solution look like? Well, to get it right, we need to ask the following three questions.

Selecting an authentication solution is no different. We should be asking ourselves: what is the customer’s need, and how can we best meet that? What does a customer-focused, secure authentication solution look like? Well, to get it right, we need to ask the following three questions.

Snippet: Every organization has its own unique IT environment, but there are a few guiding principles that apply across the board. Follow these rules to ensure a successful SCA implementation.

Every organization has its own unique IT environment, but there are a few guiding principles that apply across the board. Follow these rules to ensure a successful SCA implementation.

Snippet: Mobile wallet adoption in the US is increasing as more secure options become available, and as the technology continues to improve, it is important for both banks and consumers to realize the benefits of this particular payment model.

Mobile wallet adoption in the US is increasing as more secure options become available, and as the technology continues to improve, it is important for both banks and consumers to realize the benefits of this particular payment model.

Snippet: Not all authentication solutions are created equal. A weak solution is a chore for your customers, something that stands in the way of them doing business or shopping or communicating.

Not all authentication solutions are created equal. A weak solution is a chore for your customers, something that stands in the way of them doing business or shopping or communicating.

Snippet: Organizations from across Europe – and, in fact, the rest of the world – would be forgiven for seeing compliance with the European Union’s General Data Protection Regulation (GDPR) as just another burden on their already overstretched resources.

Organizations from across Europe – and, in fact, the rest of the world – would be forgiven for seeing compliance with the European Union’s General Data Protection Regulation (GDPR) as just another burden on their already overstretched resources.

Snippet: The researchers are now arguing strongly against the use of a single device in authentication. Their message is that if a device is compromised, everything undertaken on that device is also compromised.

The researchers are now arguing strongly against the use of a single device in authentication. Their message is that if a device is compromised, everything undertaken on that device is also compromised.

Snippet: In October 2017, Mathy Vanhoef and Frank Piessens from the University of Leuven in Belgium revealed the viability of what they term the “key reinstallation attack” (or KRACK).

In October 2017, Mathy Vanhoef and Frank Piessens from the University of Leuven in Belgium revealed the viability of what they term the “key reinstallation attack” (or KRACK).

Snippet: This year will be an important one for financial services, with security taking center stage in a number of pivotal trends and regulatory changes, including open banking and the arrival of new, flexible fintech services, as well as the activation of the European Union’s PSD2 and GDPR regulations.

This year will be an important one for financial services, with security taking center stage in a number of pivotal trends and regulatory changes, including open banking and the arrival of new, flexible fintech services, as well as the activation of the European Union’s PSD2 and GDPR regulations.

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.