Total: 50 results found.

Page 1 of 3

1. One-time passwords: What are the alternatives? ...
(Videos & Webinars)
Karen Webster, Managing Editor of PYMNTS.com, leads a conversation with Sherif Samy, SVP North America at, Entersekt, and Uri Rivner, Chief Cyber Officer of BioCatch, about on the real cost of OTPs, ...
2. Webinar recap: One-time passwords are being compromised! ...
(Blog)
What should banks be doing to prevent account takeover? For decades, the financial services industry has relied on one-time passwords (OTPs) for online user authentication. While OTP technology was state-of-the-art ...
3. One-time-passwords a decade of failure ...
(Blog)
... buy and deploy outdated, easily compromised user and transaction authentication systems. The most popular system is the one-time password (OTP), a passcode valid for a single system login or online ...
4. Passwordless authentication: The future is here
(Blog)
...  and even good practice, in the early days of computing when a person might only have one or two logins to maintain. However, in today’s world where people have hundreds of accounts, they tend to re-us ...
5. Behavioral biometrics: overcoming the password problem
(Blog)
Digitalization of banking and commerce was progressing at pace before the pandemic, but COVID-19 catalyzed consumers and businesses to adopt digital services faster than even its greatest proponents had ...
6. FIDO authentication: one more block for our SCA stack ...
(Blog)
Passwords as authenticators pose one of the greatest threats to cybersecurity today. In fact, they’re the root cause of over 80% of data breaches. User-generated passwords tend to be weak and predictable ...
7. The rise of biometrics in banking: The death of the password?
(Blog)
... found that while 92% of industry respondents say that they are interested in deploying mobile biometrics, only 13% have already done so. Risks and drawbacks The financial sector’s reluctance to push ...
8. Authentication devices: are two better than one? ...
(Blog)
... of this weakness, the researchers were able to successfully authenticate a transfer of money out of a banking account without the account holder’s permission. The researchers are now arguing strongly against ...
9. Hacking of new iPhone X biometric security offers lessons in user authentication ...
(Blog)
... on its promise of improved security. That concern is not unfounded. In the case of Apple’s early November release of iPhone X, it only took a matter of days for a Vietnamese security firm to hack the ...
10. Mobile Africa now's the time to refocus on security
(Blog)
... of mobile connectivity in Africa has been phenomenal over the last five years. More people now own a mobile device than have a toothbrush, apparently. Most of these are feature phones, but the smartphone ...
11. The password paradigm shift to FIDO: With Entersekt, you are ready
(Blog)
... from (even if only once in the last 10 years), the subscriptions you’ve taken out and the online services you’ve used. What passwords did you choose for those accounts? Chances are that you chose ones ...
12. The Citadel Trojan - It's not gone yet... ...
(Blog)
The king of financial malware, Zeus, has many variants and one particular variant, the Citadel trojan, continues to pose a significant global threat, despite the rumors of its withdrawal from the crimeware ...
13. Typical 3-D Secure implementations are not working – time to take it to the next level
(Blog)
... abandon transactions. Typically, online shoppers are required to enter a password and, since this password is rarely used, it is often forgotten, which results in incomplete or abandoned transactions. ...
14. Monetary Authority of Singapore’s transaction signing regulations force U.S. financial institutions to look at new solutions ...
(Blog)
... citizens. One of the strictest and most prescriptive set of standards in effect is the Monetary Authority in Singapore (MAS) Technology Risk Management Guidelines, which states that financial institutions ...
15. Balancing user experience with compliance under PSD2
(Blog)
... was granted for one of the Directive’s components – the strong customer authentication (SCA) requirement – until 31 December 2020. Given this respite, it is unlikely that regulators will accept any ...
16. Infographic: Authentication through the ages
(Blog)
  With the evolution of technology our interactions are becoming increasingly digital, with sensitive data being stored in the virtual realm, where we can't touch it physically. Offer your customers ...
17. App-free customer authentication solution
(Fact Sheets)
... solution that’s easier to use and more secure than one-time passwords. Entersekt’s app-free customer authentication solution provides: A low-friction fraud prevention alternative for non-app users ...
18. Omnichannel banking doesn’t have to mean omnichannel fraud
(Blog)
... It is therefore critical that a bank has robust authentication measures in place for sensitive account activities like password changes, updating contact details and mobile telephone numbers, or changing ...
19. (Omni)channel the power of authentication control
(Blog)
... validated, end-to-end encrypted channel. In the process, we transform the mobile device into a one-touch, step-up authentication tool. Read more about how our omnichannel customer authentication solution ...
20. Rules of (digital banking) engagement
(Blog)
... kiosks, chatbots, and video and telephone banking. Though the benefits of digitization – safety, compliance, and good old convenience – abound for both consumers and banks, the burning question is: ...

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.