<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.entersekt.com/resources/physical-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/backdoor</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/device-takeover-dto-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/ai-fraud-threats-how-financial-criminals</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/against-fraud</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/fraudster</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/authorized-push-payment-app</loc><lastmod>2026-05-17</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekts-scam-prevention-saving-financ</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-news-how-the-new-rules-tackle-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/telephone-oriented-attack-delivery</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-biometrics-replace-passwords</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/cryptographic-hash-function</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3d-secure-5-steps-to-global-compliance-c</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/fido</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/browser-authentication-securing-your-web</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/data-leak-prevention-dlp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/risk-signal</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3d-secure-1-is-out-are-you-in</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/broader-risk-signals-are-the-key-to-combat-ai-driven-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/stellenboschs-silicon-valley-moment</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/kyc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3d-secure-how-to-turn-a-compliance-hassl</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-interactive-transaction-authen</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/privacy-policy</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/shadow-it</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/beyond-3-d-secure-3-payment-authenticati</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/platform/3-d-secure/acs</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/domain-name-system-security-extensions-d</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/forensic-analysis</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/how-to-stay-safe-when-shopping-online-se</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/ip-amp-geolocation-2</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-authentication-driving-loyalty-th</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/one-time-biometric</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/using-open-banking-to-spot-fraud-eu-warms-to-apple-pay-policy</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/authorization</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/q2-transforming-end-users-into-fraud-fig</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/authorized-push-payment-fraud-scams</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/q2-creating-a-better-user-experience-wit</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-certificate</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/african-bank-chooses-gsm-authentication</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/exploit-banks-blind-spot-in-internal-transfers</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-attracts-top-class-experience</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/capitec-bank-selects-entersekt-for-mobil</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/ringing-the-changes-with-3d-secure</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/device-fingerprinting</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/a-smart-new-solution-to-fraud-prevention</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-and-digital-identity-paths-to-seaml</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/software-development-life-cycle-sdlc-sec</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-outdated-banking-fraud-prevention-me</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/security-information-and-event-managemen</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/speak-to-an-expert</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/how-a-modern-3ds-acs-delivers-more-flexi</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/geofencing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/incident-response</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/open-banking-and-psd2-winners-and-losers</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-secure-platform-esp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-state-of-digital-t</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/adaptive-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fighting-mobile-banking-and-online-payme</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication/biometric</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-enhances-security-tools-to-confront-increasing-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/why-authentication-now-determines-conversion-rates</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/spoofing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/selfies-for-identity-verification-weighi</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/security-keys</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/vulnerability-assessment</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/how-to-turn-open-banking-security-into-a</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/machine-learning</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/6385917923112</loc><lastmod>2026-05-11</lastmod></url><url><loc>https://www.entersekt.com/resources/information-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/third-party-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/out-of-band-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/breaking-down-silos-why-cross-channel-an</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/hardware-security-module-hsm</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-solving-the-digital-id</loc><lastmod>2026-05-20</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-what-financial-institutions-need-to</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/rethink-fraud-controls-as-false-declines-rise</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/card-not-present-fraud-cnp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/ransom-payment</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/nedbank-implements-entersekt-transaction</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/steganography</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-acquires-modirum-3-d-secure-pa</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/frost-amp-sullivan-recognises-entersekt-1</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/the-ato-prevention-shift-from-identity-t</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/zero-day-vulnerability</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/takes-ai-driven-fraud-defense-to-next-level</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/cloud-access-security-broker-casb</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/third-party-provider-tpp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/prism</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/formjacking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/accel-kkr-backs-entersekt-a-leader-in-fr</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/cryptocurrency-wallet</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/consumer-report-app-based-banking-and-pa</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/deep-packet-inspection-dpi</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/use-cases/3-d-secure-payments</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/the-lock-and-key-to-strong-security</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/coping-with-always-on-remote-work</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication-innovation-how-our-patent</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/why-one-time-passcodes-are-so-2019</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/identity-orchestration</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/ultimate-beneficial-owner-ubo</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-signs-on-to-mobile-connect</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/why-platform-banking-isnt-for-everyone</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/emv-chip-card</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-role-of-hyper-pers</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-named-leading-vendor-in-limina</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/reducing-fraud-and-strengthening-member-trust-with-real-time-intelligence</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/criminals-turning-bank-security-systems-against-themselves</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/bank-grade-payment-and-ato-fraud-prevent</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/atm-skimming</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/webinar-maximizing-customer-experience-i</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-banking-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-state-of-3d-secure-in-latin-america</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/first-party-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/retail-commercial-banks</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/the-state-of-mobile-banking-revealed</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/3-d-secure-securing-this-black-friday-an</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-news-what-banks-need-to-know-now-an</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-encryption</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/account-verification</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/the-black-friday-risk-shift-how-ai-scams</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/fight-financial-fraud-with-passwordless</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/firstbank-of-colorado</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/capitec-bank-balances-security-with-conv</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/promo-abuse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/phishing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/3-d-secure/directory-server</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/card-not-present-cnp-fraud-1</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/ebook-how-to-combat-digital-banking-and</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/6379628170112</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/face-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/emvco</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/use-cases</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-cvv-card-verification-value</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/credit-unions</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/beyond-compliance-with-3d-secure</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-application-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/revolutions-on-deck-the-trends-poised-to-define-fintech-and-banking-in-2026</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/nedbank-and-entersekt-mobile-authenticat</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/3ds-20-demands-more-attention-as-fraud-defense-from-issuers-and-merchants</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/ip-amp-geolocation-3</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/malicious-domain</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-authentication-understanding-cust</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/new-multi-factor-authentication-threat-h</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/hashing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/contact-us</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/device-id</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/layered-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/money-mules</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fido2</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-partners-with-lastpass-to-prov</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/transforms-fight-against-scams-latest-ai-tech</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/merchants-acquirers-psps</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-app-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/shaping-the-future-of-sca-modernizing-europes-approach-to-fraud-prevention</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/secure-socket-layer-ssl</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/qr-payment</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/from-psd2-to-psd3-turning-a-compliance-c</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/firewall</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/money-laundering</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-power-of-trusted-endpoints</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/nuvision-cu-on-member-to-member-transfer</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/identity-verification</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/distributed-denial-of-service-ddos</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/gettransakt</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/hardware-token</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cross-channel-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3-d-secure-makes-payments-better-for-merchants-shoppers-worse-for-fraudsters</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3-problems-with-password-resets-and-how</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/risk-based-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/reduce-digital-banking-and-payment-fraud</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/trojan-horse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/rogue-access-point</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/friendly-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/call-center-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/at-entersekt-i-found-the-confidence-and</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/reseller-abuse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/integrity-monitoring</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-profiling</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-authentication-a-passwordless</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/firmware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cbuaes-security-mandate-could-pose-issues</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/man-in-the-browser-mitb-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-certificates-a-modern-solution-t</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/ensuring-digital-payment-security</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/physical-biometrics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/physical-token</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/electronic-banking-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/account-takeover-threats-on-small-busine</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/criminals-and-financial-fraud-schemes-st</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-card-industry-pci</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/context-aware%EF%B8%8F-authentication</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/coaching-the-golden-people-tool</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/back-against-mobile-banking-and-payments-fraud-in-europe</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/wi-fi-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/universal-second-factor-u2f</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/crimeware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/red-team-testing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-defining-digital-ident</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/acceptable-friction-with-3-d-secure-a-co</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/non-repudiation</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-footprint</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-identity</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/threat-intelligence</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/risk-based-authentication-the-secret-to</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/virtual-private-server-vps</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/application-fraud-new-account-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/internet-of-things-iot</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/keylogger</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-enhancements-to-enters</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/ip-amp-geolocation-1</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/understanding-brazils-pix-payments</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/deepfake</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cybersecurity</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/sim-swapping</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/smart-contract</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/elder-financial-abuse-elderly-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/penetration-testing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/leaders-investors</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/bonifii-and-entersekt-announce-new-conte</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-announces-jon-roskill-as-new-b</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-signature</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/firstbank-leverages-entersekt-to-secure</loc><lastmod>2026-05-06</lastmod></url><url><loc>https://www.entersekt.com/resources/channel-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/certificate-revocation-list-crl</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-banking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/guide-to-fido</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-gateway</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/apple-launches-digital-id-in-wallet</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/frost-amp-sullivan-recognises-entersekt</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/biometrics-alone-arent-enough-for-credit-unions-to-stop-deepfake-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/chargeback-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/counterfeiting</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-adds-tools-to-help-banks-block-fraudsters</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/threat-hunting</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-entersekt-story</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/context-aware-authentication</loc><lastmod>2026-05-17</lastmod></url><url><loc>https://www.entersekt.com/resources/how-context-aware-authentication-detects</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/emv-3-d-secure</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/visible-vs-invisible-banking-security-th</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/supply-chain-attacks</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-adds-passive-privacy-friendly</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/launches-ai-powered-scam-protect-to-combat-rising-fraud</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/3-ways-to-win-against-account-takeover-f</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-why-unified-authentica</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/beyond-the-numbers-why-smarter-risk-inte</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/rapid_roi_with_entersekt-q2_authentication_success_story.pdf</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/endpoint-detection-and-response-edr</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/use-cases/digital-banking-fraud-prevention</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/the-rise-of-biometrics-in-banking</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/ceo-says-ai-cant-change-the-fundamentals-of-digital-trust</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/insider-threat</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/encrypted-email</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-attacks-trends-push-banks-into-a-machine-vs-machines-arms-race</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/credential-management</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/crypto-scam</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fido-ensuring-ecommerce-security</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/brute-force-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/certificate-authority</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-great-data-divide-removing-the-silos</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/browser-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-digital-banking-fraud-persists-in-a</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3ds-acs</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fis-take-biometrics-approach-to-battling-account-takeovers</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/fraudulent-transfer</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fraud-detection-system</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/swisscard-aecs-case-study</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/intrusion-prevention-system-ips</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/is-your-fis-security-ready-for-the-holid</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/an-fis-guide-to-digital-wallet-fraud-pre</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/immersive-biometrics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/openid-connect</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/rules</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/supply-chain-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/merchant-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-intelligence</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/summer-25-fraud-report</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-authentication-platform-now-pl</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/application-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cognitive-biometrics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/breach-sites</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-authentication-four-best-practice</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/zelle-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/credit-unions-turn-to-biometric-authenti</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/passkeys</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/events</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/malware-as-a-service-maas</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/a-history-of-3-d-secure-creating-workabl</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-partners-with-alloy-to-enhance</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/e-skimming</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/telcomno-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/orkestrate</loc><lastmod>2026-05-20</lastmod></url><url><loc>https://www.entersekt.com/resources/customer-identity-and-access-management</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-malware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/psd2-compliance</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/terms</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/rebuilding-resilience</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/financial-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/otp-bots</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3-d-secure-payment-rails-the-highways-no</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/how-to-stop-app-fraud-protect-your-busin</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/real-time-payment-fraud-monitoring-the-n</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/simplified-secure-payment-authentication</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/stopping-zelle-scams-in-their-tracks</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/celebrating-human-rights-day-our-people</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/neobanks-fintech</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-expands-into-usa-market</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/consumer-banking-security-authentication</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/company-culture-in-one-word</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/web-application-firewall-waf</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/identity-theft</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-and-ndgit-partner-on-secure-op</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/digital-banking-platforms</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication-pymnts-survey-report</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-operational-resilience-act-dora</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/whys-risk-based-authentication-growing</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/5-ways-fraud-prevention-can-reduce-call</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/affiliate-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-card-industry-data-security-stan</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/to-authenticate-caller-dial-one</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/balancing-ux-with-compliance-under-psd2</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/java-secure-socket-extension-jsse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/exploit-kit</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/client-side-encryption</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/time-based-one-time-passwords-totp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-journey-from-otps-to-secure-seamless</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/the-future-of-super-apps-in-africa-relie</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/six-threats-to-mobile-banking</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-wallet</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/immediate-payments</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/what-to-look-for-in-a-3ds-acs-provider-i</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/keystroke-dynamics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/instant-payment</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/card-issuer</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/job-scam</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/account-takeover-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/five-ways-to-future-proof-your-company-w</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/refund-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/unveiling-the-dark-side-how-real-time-pa</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication-factor</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-analytics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/voice-biometrics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/multi-cloud-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/daf-and-taf-what-changes-merchants-and-i</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/identity-and-access-management-iam</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/tokenization-and-3-d-secure-raising-appr</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/about-fraud-speaks-to-frank-moreno-at-mo</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/banking-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/wire-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/case-study_centennial_bank_cuts_cnp_fraud_by_30.pdf</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/improving-wellness-in-the-workplace</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-biometrics-vs-behavioral-anal</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/indicators-of-compromise-iocs</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-recognized-as-leading-vendor-f</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/data-encryption-standard-des</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/contactless-payment</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/views-on-future-proof-finance-from-a-mod</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes/higher-transaction-success-rates</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/browser-id-and-silent-authentication-underpin-online-banking-security</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/celebrating-youth-empowerment-in-june</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/zero-trust-architecture</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/attack-surface</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-template</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/loyalty-abuse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-authentication-transforming-today</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-joins-fido-alliance-to-enginee</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/card-verification-value-cvv</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/intellectual-property-our-secret-weapon</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/knowledge-factor</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/elder-financial-abuse</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behavioral-biometrics</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-named-best-authentication-inno</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/from-garden-tools-to-data-tools-a-journe</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-and-biocatch-collaborate-to-de</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/convergence-of-fraud-detection-and-cyber</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/hacker</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/internal-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/internet-of-things-iot-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/honeypot</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/multi-factor-authentication-mfa</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/launches-scam-protect-1267843</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/demo-fighting-third-party-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/global-threat-intelligence</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fileless-malware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-awarded-new-patent-for-frictio</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/intrusion-detection-system-ids</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/3-d-secure</loc><lastmod>2026-05-20</lastmod></url><url><loc>https://www.entersekt.com/solutions/industries/issuing-banks-payment-processors</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/data-the-fuel-driving-modern-fraud-preve</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/tokenization</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/man-in-the-middle-attack</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/synthetic-identity-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/device-based-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/faster-payments-means-faster-better-fraud-fighting-tools</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/cyber-threat-intelligence</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/card-verification-code-cvc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/collaborative-defense-role-intelligent-friction-ai-fraud-prevention</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/bank-identification-number-bin</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-3-d-secure-challenge-in-payments-fra</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/ip-amp-geolocation</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/nedbank-chooses-entersekt-for-its-mobile</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/5-ways-banks-can-protect-their-seniors-f</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/fuzz-testing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/online-banking-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/deep-web</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/secure-enclave</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/encryption-key</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/chargebacks</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-datos-insights-2025-impact-awards-in</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/geo-location-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/takes-on-scammers-with-ai-driven-fraud-prevention-tools</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-risk-conditions-in-rba</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/multi-layered-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-rethinks-its-south-african-off</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3ds-is-an-authorization-tool-most-of-the</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/context-aware-authentication-1</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/access-control-server-acs</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/stop-using-sms-to-secure-your-account-heres-why</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-secures-over-one-million-users</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3ds-directory-server</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes/better-cx</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/email-spoofing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-demystifying-risk-base</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-authentication-for-frictionles</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-and-ebankit-partner-to-bring-i</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/whitelisting</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/federated-identity</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/bitcoin</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/demystifying-risk-based-authentication</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/mastering-the-interplay-of-tokenization</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/pharming</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-decreasing-friction-an</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/advanced-persistent-threat-apt</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/data-loss-prevention-dlp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/card-not-present-cnp-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/credential-stuffing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/complying-with-mastercards-identity-chec</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/general-data-protection-regulation-gdpr</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/modirum-acs</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/endpoint-protection</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-news-beyond-compliance-how-banks-ca</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/end-to-end-encryption</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fido-app-free-authentication-at-pluscard</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/when-bots-break-the-rules-how-banks-can</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/unified-threat-management-utm</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/transaction-security-code-tsc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/social-engineering-attacks-what-every-ba</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/endpoint-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/nist-cybersecurity-framework</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/regulation-e</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/single-sign-on-sso</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/delivering-success</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/episode-249-3-d-secure-strong-customer-authentication-stripe-entersekt</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/what-banks-need-to-know-about-authorized</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/whats-the-deal-with-enhanced-atms</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/customer-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/ceo-on-scams-bigger-the-bullet-the-thicker-the-armor</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/accel-kkr-welcomes-tim-sherwin-to-enters</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-signature-certificate-dsc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/peer-to-peer-payments-p2p</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/empathy-in-2024-how-are-you-doing</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/otps-for-customer-authentication-past-th</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/data-masking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/psychological-safety-in-the-workplace</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/cybercrime-cyber-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/modirum</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fintechs-next-phase-will-be-orchestrated-not-adopted</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/checkout-experiences-how-do-we-do-better</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/phone-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/secure-a-passwordless-future-with-fido</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/incident-response-plan</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-banks-can-no-longer-trust-voice-biom</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication/mno</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/how-passwordless-authentication-offers-n</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/social-engineering-scams-how-deepfakes-p</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/oauth-open-authorization</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/psd2</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/rootkit</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/streamlining-call-center-efficiency-the</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/bust-out-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/support</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/investment-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fido-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/transaction-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/user-behavior-analytics-uba</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-benefits-of-modernizing-3-d-secure-a</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-payments</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/man-in-the-cloud-mitc-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-lessons-from-award-win</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/address-verification-system-avs</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/watering-hole-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/holistic-authentication-is-a-critical-de</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/extended-validation-ev-ssl-certificate</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-fido-alliance-certification-matters</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/cryptocurrency</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/code-obfuscation</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/common-vulnerabilities-and-exposures-cve</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/open-banking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/qr-codes-gain-favor-with-banks-in-sa</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/strong-customer-authentication-sca</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/an-fis-guide-to-digital-wallet-payment-s</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-survey-banking-app-innovation</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-securing-digital-banki</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication/silent</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/partners</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/how-contextual-awareness-lets-right-guy-in-transaction-security</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/shaping-a-secure-digital-future-with-fid</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/from-risk-to-resilience-the-solution-sla</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/reputation-based-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/liminal-link-index-for-account-takeover</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/built-in-south-africa-growing-in-atlantas-fintech-scene-entersekt-ceo-schalk-noltes-talks-moves-in-the-ai-age</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/quantum-cryptography</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/romance-scam</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/use-cases/call-centre-authentication</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/reduces-digital-payment-fraud</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/ebook-authentication-reimagined</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/sim-swap-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fintech-rundown-a-rapid-review-of-weekly-news</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/delivering-the-right-balance-one-in-thre</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/scam-prevention</loc><lastmod>2026-05-17</lastmod></url><url><loc>https://www.entersekt.com/resources/man-in-the-middle-mitm-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cross-site-scripting-xss</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/5-ways-banks-and-credit-unions-can-use-f</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/employee-wellbeing-in-the-workplace</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/social-engineering-attacks-in-real-time</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3d-secure-a-data-open-approach-for-a-bri</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/mfa-your-best-defense-against-social-eng</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes/operational-cost-saving</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-key-to-balancing-s</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-service-provider-psp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/social-engineering</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/pluscard-authenticates-payments-with-fid</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/the-invaluable-role-silent-authenticator</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/building-trust-in-an-era-of-open-banking</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/data-privacy</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/how-to-manage-the-complexities-of-3d-sec</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/fraud-fusion-center</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/data-anonymization</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-services-directive-psd</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/username</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/scam-dynasty-how-ai-became-the-new-weapon-in-the-war-on-fraud</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/solutions</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/platform/3-d-secure/server</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication/browser</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/phishing-attack</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-seamlessly-balancing-f</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/real-time-payment-rtp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/regulation-e-beyond-compliance-a-powerfu</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-tokenization</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/banking-on-trust-friction-for-fraudsters</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/modirum-3d-secure</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/two-factor-authentication-2fa</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/financial-institutions-and-fraud-learnin</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/dark-web</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/context-based-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cpo-says-fighting-fraud-should-be-treated-like-team-sport</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/seon-biocatch-entersekt-update-platforms-with-adaptable-tools-to-fight-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-enables-fido-authentication-fo</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes/regulatory-compliance</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/building-digital-banking-journeys-that-r</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/the-ai-fraud-crisis-your-bank-is-not-ready-for</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-transformation-is-skyrocketing</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/online-shopping-scams</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/vishing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/preparing-for-psd3-managing-increased-li</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/case-studies</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/pin-debit</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cloud-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/how-ai-in-authentication-enhances-securi</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/events/q2-connect-26</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/3-d-secure-acs-buyers-guide</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/insurance-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/defeating-evolving-fraud-with-dynamic-au</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/preventing-emerging-payment-scams-a-stra</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/five-banking-and-digital-payments-securi</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/fido-the-passwordless-mfa-solution</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/share-playbooks-so-why-wont-banks-share-data</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/scareware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/data-breach</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/remote-access-trojan-rat</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/how-to-defeat-the-3-major-fraud-schemes</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/platform</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/the-power-of-omnichannel-authentication</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/insider-threat-detection</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/chip-and-pin</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-scam-prevention-shouldnt-sit-on-cust</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/retail-banking-security-consumer-behavio</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/near-field-communication-nfc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/lakeside-bank-on-fraud-challenges-facing</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-branches-out-into-cape-town</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/transact-with-confidence</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/compliance-certifications</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-reducing-p2p-fraud-wit</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/interception</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/check-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/human-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/machine-learning-model-poisoning</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/geolocation</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fall-25-fraud-report-insights-the-voice</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/inside-social-engineering-attacks-tactic</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/mobile-device-management-mdm</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/trusted-device</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-announces-new-investment-from</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/essential-elements-of-a-branchless-bank</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/social-media-engineering</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/one-time-password-otp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/platform/authentication/mobile</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/multi-factor-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/tokenization-and-3-d-secure-complementar</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/consumer-duty</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/strong-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/worm</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/kiosk-banking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/striking-the-right-balance-to-combat-ris</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/platform/risk-intelligence/authentication-advisor</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/resources/anti-phishing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/celebrating-capitecs-mobile-banking-app</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/managed-security-service-provider-mssp</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/transaction-monitoring</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-best-way-to-fight-ai-fraud-is-with-a</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/disclosure-policy</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/stellenbosh-based-entersekt-opens-uk-off</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/-brandyn</loc><lastmod>2026-05-11</lastmod></url><url><loc>https://www.entersekt.com/resources/transaction-authentication-number-tan</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/application-programming-interface-api</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/banking-authentication-5-trends-from-exp</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/trusted-execution-environment-tee</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/data-classification</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/business-email-compromise</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/account-takeover-ato</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/secure-access-service-edge-sase</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/security-authentication-how-does-enterse</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/mental-health-awareness</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-cvv</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/the-top-3-fraud-tactics-that-lead-to-acc</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/chargeback</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/root-certificate</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-how-customer-choice-an</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/app-based-authentication</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/solutions/use-cases/passwordless-authentication</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/working-abroad-and-other-win-win-employe</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/has-ai-killed-authentication-not-when-it</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/papefunds-expands-strategic-investment-i</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/fraudsters</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/plata-partners-with-entersekt-to-protect</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/grid-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-closes-record-year-of-growth-a</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-transformation-at-private-banks</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-puts-down-roots-in-the-usa</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/ransomware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-fraud-non-plastic</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/disk-encryption</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/time-for-the-digital-banking-revolution</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/bin-scans-ddos-and-the-next-cybercrime-wave-hitting-south-africas-banks</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/public-key-infrastructure-pki</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/world-class-digital-banking-security</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-news-for-issuers-the-future-of-3-d</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/application-layer-firewall</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/artificial-neural-network</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/blockchain</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/domain-spoofing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/lateral-movement</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cyber-insurance</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/tis-the-season-how-context-aware-authent</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/device-identity</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication-success-leans-on-consistent-user-experiences</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/dynamic-linking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/identity-proofing</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/card-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/session-hijacking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-expands-leadership-team-in-202</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/capitec-bank-boosts-card-use-and-checkou</loc><lastmod>2026-05-19</lastmod></url><url><loc>https://www.entersekt.com/resources/new-software-engineering-graduate-progra</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/zero-trust-network-architecture</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fraud-farms</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/artificial-intelligence-ai</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/possession-factor</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/micro-transaction-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/ato-alert-outdated-mobile-authentication</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/security-token-service-sts</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/bust-out-fraud-how-financial-institution</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/router-security</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/honeynet</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3ds-servermpi</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-poll-customer-trust-likely-to</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/redefining-the-future-of-friction-free-d</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-evolution-of-fraud</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/how-biometrics-stop-instant-payments-bec</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/visible-and-invisible-security-perceptio</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/strong-customer-gains-and-standout-us-gr</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/customer-account-takeover-ato</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/3d-secure</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/geotagging</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-effect-of-disjoint</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/how-a-broader-view-of-3-d-secure-can-tru</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/password-manager</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/passwordless-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/what-hath-3d-secure-wrought-in-2025</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/real-time-payment-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-why-your-legacy-3ds-ac</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/behind-the-shield-the-fraud-vectors-that</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/psd3-news-what-changes-are-expected-for</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/inherence-factor</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-user-authentication-technology</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/why-credit-unions-need-advanced-authenti</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/boosting-e-commerce-security-and-convers</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/encryption</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/access-control</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/authorized-push-payment-app-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/investec-goes-global-with-push-based-aut</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/home-test</loc><lastmod>2026-05-18</lastmod></url><url><loc>https://www.entersekt.com/request-demo</loc><lastmod>2026-05-16</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-launches-orkestrate-api-to-tackle-usd-40-billion-fraud-risk</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/3-d-secure-3ds</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/biometric-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/passwordless-authentication-is-here</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/banking-apps-becoming-personalized</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/silent-authentication</loc><lastmod>2026-05-17</lastmod></url><url><loc>https://www.entersekt.com/why-entersekt/careers</loc><lastmod>2026-05-21</lastmod></url><url><loc>https://www.entersekt.com/resources/malware</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/solutions/outcomes/reduce-cost-of-fraud</loc><lastmod>2026-05-20</lastmod></url><url><loc>https://www.entersekt.com/resources/thales-updates-and-enhances-naranja-xs-payment-security</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/payment-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication-study-transforming-the-cu</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/botnet</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/6-ways-browser-id-paves-the-way-for-a-fr</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/domain-based-message-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/why-good-enough-isnt-winning-banks-fight-against-fraud</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-partners-with-capitec-bank-to</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/continuous-authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/privacy-policy</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/invoice-scams</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/first-party-check-fraud</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/automated-clearing-house-payments-ach</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fintech_spotlight_aite_novarica</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/authentication</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/internet-banking</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/daf-and-tafs-impact-on-banks-merchants-a</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/ebook-lessons-from-an-award-winning-auth</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-rolls-out-behavioral-analytics</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/transport-layer-security-tls</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/hyper-personalized-authentication-digita</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/about-fraud-interview-with-pradheep-samp</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/user-provisioning</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cyberthreats-to-financial-institutions-i</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/virtual-private-network-vpn</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/cryptanalysis</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/risk-based-authentication-rba</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/strong-customer-authentication-solutions</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/bluetooth-low-energy-ble</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/reverse-engineering</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/6gxrkqyqp59qb3wj</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/social-engineering-fraud</loc><lastmod>2026-05-17</lastmod></url><url><loc>https://www.entersekt.com/resources/sa-banks-concerned-by-app-fraud-look-to</loc><lastmod>2026-05-14</lastmod></url><url><loc>https://www.entersekt.com/resources/software-token</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/scammers</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/entersekt-sichere-authentifizierung-fr-d</loc><lastmod>2026-05-15</lastmod></url><url><loc>https://www.entersekt.com/resources/digital-banking-fraud-prevention-be-prep</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.entersekt.com/resources/know-your-customer-kyc</loc><lastmod>2026-05-07</lastmod></url><url><loc>https://www.entersekt.com/resources/fraud-isnt-the-problem-friction-is-and-h</loc><lastmod>2026-05-14</lastmod></url></urlset>