KeyMe aims to be a secure and convenient way to copy, share and personalize keys, while also helping to solve frustrating lockouts.
Twistlock just signed off on Twistlock 2.1, the 10th time they have shipped a major release of Twistlock. The latest version includes some new features across all areas of the product, including a container centric app firewall, vulnerability risk ranking that aims to use knowledge of your unique environment to prioritize what to fix first, and a new dashboard.
How Office 2016 and Office 365 differ can be confusing, especially since both include, more or less, the same applications. IT News lists some top ways to tell these platforms apart.
A new startup called Finxact is going all in on open banking, and is even releasing a new core via API. Finxact is offering this functionality through its sandbox, and invites interested banks to work with the sandbox at no cost.
A greater number of ATM skimming incidents now involve so-called “insert skimmers,” wafer-thin fraud devices made to fit invisibly inside a cash machine’s card acceptance slot. New evidence suggests that at least some of these insert skimmers — which record card data and store it on a tiny embedded flash drive — are equipped with technology allowing them to transmit stolen card data wirelessly via infrared, the same communications technology that powers a TV remote control.
After 50 years using clunky ATMs, many banks are eyeing costly “cardless” upgrades to the old models that perform more functions by remote control using a mobile phone, and consumer reaction to them could be a bellwether for adoption of other mobile payment technologies.
Trend Micro's cybersecurity solutions are coming to VMware Workspace ONE and VMware AirWatch to help IT leaders protect devices from a growing number of mobile attacks.
Alhough it may be happening, The Wirecutter was unable to find any credible reports of actual, real-world RFID identity or credit card theft. They go on to suggest that consumers are far more likely to be affected by a card skimmer at an ATM, or a breach of a major retailer.
AT&T and NetComm Wireless unveiled a plan to supply fixed-wireless equipment across certain US states. TechRepublic explains why this plan could be smarter than deploying fiber.
Bitscout 2.0 is not only based on open-source tools, it is an open source tool itself that lets you build your own LiveCDs – your own types of Bitscout systems. In action, the tool is essentially a collection of scripts which anyone can validate, customize and improve.
Cylance announced the integration into VirusTotal of its artificial intelligence (AI)-driven anti-malware engine. VirusTotal is a complimentary online service that analyzes files and URLs with the aim of enabling the identification of malware detected by antivirus engines and website scanners.
Viewpost surveyed a cross-section of 1,000 consumers, finding that overall, 80 percent of Americans are in support of payments technologies and currencies, including tools like sensor fingerprinting, facial recognition, retinal scanning and voice control, as well as currencies like Bitcoin.
According to the 2017 Identity Fraud Study by Javelin Strategy & Research, 15.4 million Americans experienced some form of ID fraud, with $16 billion lost in the process. That's up from 13.1 million victims and $15.3 billion in losses in 2015. The issue is so troubling that many people are turning to identity theft protection - a $3 billion market, according to IBIS World, with up to 60 marketplace providers. Growth is on the upswing, too. According to a 2016 report from Smithers Pira, the identity protection market is expected to grow to $9.7 billion by 2021.
The general framework of two-factor authentication still offers meaningful protection, but The Verge says that as of 2017, just having two-factor is no longer enough. It has become clear that most two-factor systems don’t stand up against sophisticated users. Two-factor’s trickiest weak point? Wireless carriers.
Removing Friction from the Digital Experience
IMM - http://www.immonline.com
Read Michael Ball's comments:
This report examines the size of the Millennial-owned small business market and identifies key areas of investment that will help set up banks for success as Millennials expand their businesses and seek out more complex and profitable banking services.
Self-checkout lanes have become a mainstay in many grocery stores, enabling consumers to bypass the traditional checkout process and act as their own cashier. Financial institutions are looking to their own ATMs as a place to adopt the express checkout trend. By allowing customers to act as their own tellers, banks are enhancing the experience of everyday transactions.
Electronics payments association NACHA is hoping to nudge along the industry's adoption of APIs by setting up a standardisation working group.
Curve is giving its British and European Mastercard users the ability to switch a purchase between credit or debit up to two weeks after the transaction took place. The payment swap is complimetary and should take less than 10 seconds through Curve's Android and iOS apps.
As the nation’s automated clearing house network gears up to introduce same-day debits in September, observers are warning that faster processing is likely to open the door to more fraud unless businesses and financial institutions adopt new policies.
Small businesses need RDC, but FIs acknowledge there’s room for improvement in getting the word out. When they don’t promote RDC, FIs miss the chance to form value partnerships by selling a service with tremendous small businesses benefits.
Vodafone is telling businesses that decide to incorporate SDN and NFV into their network infrastructure that they will have to rethink how they purchase and procure network equipment. Nemertes Research's study revealed that survey participants found SD-WAN reduced outages by an average of 95% and WAN troubleshooting costs by an average of 92%.
It’s common to find a myriad of network and security equipment in a branch including a router, firewall, WAN optimizer, VPN concentrators, along with almost anything else you can think of. This, of course, results in an operational nightmare as network administrators. With modern branch offices, the solution should be to entirely eliminate some functions through service chaining to places on the network where those functions should sensibly reside.
By paring branch locations down so that just the essential capabilities are resident onsite, distributed organizations can dramatically simplify WAN management. The rise of software-based routing and SD-WAN could jump-start the displacement of traditional branch routers, as more organizations realize the benefits of moving to software.
Software-defined networking and network function virtualization are two important, but sometimes confusing, trends in the networking industry. This article explains the different terminology.
The article asks 17 customer service and training experts to weigh in with their stance on the term "soft skills." If they are opposed to it, they are asked to offer an alternative.