Slide background

The Entersekt blog.

Industry news, security threats, and technology advances in consumer authentication
The (lock and) key to strong security

The (lock and) key to strong security


Let me begin with a short story, a true story. A good friend of mine’s house was recently broken into. He was asleep in bed when this event took place, and he heard nothing. In fact, when he got up in the morning, he didn’t even notice at first that the event had taken place, such was the subtlety of the break-in. The thief had managed to break a door lock, opening the door without making much sound at all. The technique was to snap off the front of the lock and use a screwdriver to open the door: very quiet and very quick. 

Read More ...

Snippet: In digital banking, and more recently also in the mobile payments sphere, security and usability are commonly viewed as incompatible priorities. By implication, for security to be strong enough, it must also impose inconvenience on the user. At Entersekt, however, we prefer to ask: why do banks have to choose?

In digital banking, and more recently also in the mobile payments sphere, security and usability are commonly viewed as incompatible priorities. By implication, for security to be strong enough, it must also impose inconvenience on the user. At Entersekt, however, we prefer to ask: why do banks have to choose?

Snippet: As we increasingly move our lives online, it is no surprise that fraud should be following us. The rise of ecommerce and digital banking has resulted in growing levels of fraud targeting these new business channels. In this blog post, London-based analyst Alan Goode investigates what is currently happening in the UK.

As we increasingly move our lives online, it is no surprise that fraud should be following us. The rise of ecommerce and digital banking has resulted in growing levels of fraud targeting these new business channels. In this blog post, London-based analyst Alan Goode investigates what is currently happening in the UK.

Snippet: Durch PSD2 wird es zu einer ganz neuen Marktdynamik kommen. Einerseits müssen sich Banken auf Belastungen durch neue Compliance-Anforderungen und erweiterte Haftungsrisiken einstellen, andererseits entstehen durch das regulatorische Rahmenwerk auch neue Umsatzchancen.

Durch PSD2 wird es zu einer ganz neuen Marktdynamik kommen. Einerseits müssen sich Banken auf Belastungen durch neue Compliance-Anforderungen und erweiterte Haftungsrisiken einstellen, andererseits entstehen durch das regulatorische Rahmenwerk auch neue Umsatzchancen.

Snippet: I sometimes think that here, in the IT security sector, we’re having the wrong conversation about authentication. As we debate the respective merits of the various solutions, we’re in danger of forgetting the most important member of the value chain: the customer.

I sometimes think that here, in the IT security sector, we’re having the wrong conversation about authentication. As we debate the respective merits of the various solutions, we’re in danger of forgetting the most important member of the value chain: the customer.

Snippet: Every organization has its own unique IT environment, but there are a few guiding principles that apply across the board. Follow these rules to ensure a successful SCA implementation.

Every organization has its own unique IT environment, but there are a few guiding principles that apply across the board. Follow these rules to ensure a successful SCA implementation.

Snippet: Mobile wallet adoption in the US is increasing as more secure options become available, and as the technology continues to improve, it is important for both banks and consumers to realize the benefits of this particular payment model.

Mobile wallet adoption in the US is increasing as more secure options become available, and as the technology continues to improve, it is important for both banks and consumers to realize the benefits of this particular payment model.

Snippet: Not all authentication solutions are created equal. A weak solution is a chore for your customers, something that stands in the way of them doing business or shopping or communicating.

Not all authentication solutions are created equal. A weak solution is a chore for your customers, something that stands in the way of them doing business or shopping or communicating.

Snippet: Organizations from across Europe – and, in fact, the rest of the world – would be forgiven for seeing compliance with the European Union’s General Data Protection Regulation (GDPR) as just another burden on their already overstretched resources.

Organizations from across Europe – and, in fact, the rest of the world – would be forgiven for seeing compliance with the European Union’s General Data Protection Regulation (GDPR) as just another burden on their already overstretched resources.

Snippet: The researchers are now arguing strongly against the use of a single device in authentication. Their message is that if a device is compromised, everything undertaken on that device is also compromised.

The researchers are now arguing strongly against the use of a single device in authentication. Their message is that if a device is compromised, everything undertaken on that device is also compromised.

Snippet: In October 2017, Mathy Vanhoef and Frank Piessens from the University of Leuven in Belgium revealed the viability of what they term the “key reinstallation attack” (or KRACK).

In October 2017, Mathy Vanhoef and Frank Piessens from the University of Leuven in Belgium revealed the viability of what they term the “key reinstallation attack” (or KRACK).

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.