CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

June 12, 2017

 


Hardware News

 

NSS Labs Announces 2017 Next Generation Firewall Group Test Results

NSS Labs announced the results of its Next Generation Firewall (NGFW) Group Test. Eleven products from 10 market-leading vendors were tested in the key areas of security effectiveness and total cost of ownership (TCO). Of the NGFW vendors whose products had results published today, seven products received a Recommended rating, while four products received a Caution rating.

nsslabs.jpg

 

HPE Debuts 'World's Most Secure Servers'

HPE unveiled its 10th-generation ProLiant servers, which it called the "world's most secure industry standard servers." According to a press release, HPE utilizes silicon-based security in its platforms, as a means of addressing firmware issues. The servers will work in tandem with other updates as part of HPE's Synergy composable infrastructure.

hpe.jpg

 

iStorage Introduces the 'Most Secure Hard Drives Ever Made'

iStorage announced the launch of their new range of USB 3.1 Hard Disk Drives (HDD) and Solid State Drives (SSD), consisting of the diskAshur², diskAshur² SSD, diskAshur PRO², diskAshur PRO² SSD and the diskAshur DT². The new drives feature Enhanced Dual Generating Encryption (EDGE) technology.

istorage.jpg

 

Radware Launches New Line of Alteon ADCs

Radware announced the new Alteon D-line of appliances and software which are designed to address evolving market challenges around the increase in encrypted traffic, the increase in encrypted attacks and malware, and the growing needs for data center automation. Radware Alteon D-line is available with a range of add-on software modules and subscriptions that extend the capabilities of the application delivery controller (ADC).

radware.jpg

 

List of Printers Which Do or Do Not Display Tracking Dots

The Electronic Frontier Foundation notes that "it is probably safest to assume that all modern color laser printers do include some form of tracking information that associates documents with the printer's serial number."

eff.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Outdated Operating Systems, Browsers Correlate with Real Data Breaches

Organizations that run more than half of their computers on outdated operating systems are three times more likely to suffer a data breach, while those running more than half of their browsers on old versions are twice as likely to get hit with a breach, a new study found.

darkreading.jpg

 

Microsoft: Windows 10 S Not Affected by Any 'Known Ransomware'

Ransomware is one of the most prominent cybersecurity threats in the enterprise, but it doesn't work against Windows 10 S, Microsoft said. According to a recent blog post by Robert Lefferts, director of program management for Windows Enterprise and Security, "no known ransomware works against Windows 10 S," which Lefferts also called Microsoft's "most hardened operating system."

techrepublic.jpg

 

Complimentary Windows Tools

This article covers complimentary tools and apps that can help you better use Windows -- whether it's the latest version, Windows 10, or earlier iterations still in use.

computerworld.jpg

 

FFIEC Releases Update to Cybersecurity Asset

The Federal Financial Institutions Examination Council (FFIEC), on behalf of its members, just released an update to the Cybersecurity Assessment Tool (Assessment). This update to the Assessment addresses changes to the FFIEC IT Examination Handbook by providing a revised mapping in Appendix A to the updated Information Security and Management booklets. The updated Assessment will also provide additional response options, allowing financial institution management to include supplementary or complementary behaviors, practices and processes that represent current practices of the institution in supporting its cybersecurity activity assessment.

ffiec.jpg

~~~

Back to Top


ATMs/Kiosks

 

ATM Skimming Detection Minus the Downtime: More than a Myth?

ATM jackpotting malware makes for big headlines, but it's garden variety ATM skimming that makes up the bulk of ATM attacks — and financial losses — worldwide. Many deployers are reluctant to try antiskimming solutions because they believe they'll have to choose between maximum uptime and maximum security, and that it's just wishful thinking to expect they could have both.

atmmarketplace.jpg

 

An 'ATM Lobby' Description Delays Plans for Fully Automated Branch

A snag in plans to open an automated bank branch in downtown Minneapolis is providing insight into issues FIs might encounter as they seek to transform their business model in a world that's still catching up with 21st century fintech.

atmmarketplace.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries

 


Back to Top


Wireless World

 

Mobile Bill Pay Surges

A new Fiserv report entitled "2017 Expectations & Experiences: Consumer Payments" shows substantial growth in mobile bill pay offerings and usage over the past year. Almost one in five visits to a biller’s website come from a mobile device which equals a 55% increase over 2013.

fiserv.jpg

 

New Data Busts Myths About Gender, Age in Mobile Wallet Use

Early predictions held that millennial men would be first to adopt mobile wallets. However two new research studies are casting doubt on the assumptions about the roles gender and age are playing in the mobile payments adoption.

paymentssource.jpg

 

Soon You Can Send Money to People Directly in iMessage

Apple just unveiled a new peer-to-peer payments system for its Apple Pay service, putting it in competition with PayPal-owned Venmo. With the new payment capability, which Apple says will be launching as an iMessage app, users will be able to send and receive money right within a text conversation. Apple device owners will have the option to authenticate their transaction through Touch ID.

time.jpg

~~~

Back to Top


Security Section

 

Balbix Launches Predictive Breach-Risk Platform

The company announced the general availability of its AI-based platform and reveals details of powerful outcomes achieved by design partners and early customers. The Silicon Valley-based company claims that they have built the security industry's first predictive breach-risk platform.

darkreading.jpg

 

Centrify Fortifies Platform Security with Bugcrowd Bug Bounty Program

Centrify will award up to $3,000 per vulnerability to ensure the security of the Centrify Identity Services platform. The public program will leverage more than 50,000 security researchers on the Bugcrowd platform to help reinforce the security of the Centrify Identity Services platform.

centrify.jpg

 

Bored Employees Seen as Biggest Potential Data Security Risk

Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a recent snapshot poll at Infosec Europe. More than a third (35%) cite distraction and boredom as the main cause of human error, while other causes include heavy workloads (19%), excessive policies and compliance regulations (5%), social media (5%) and password sharing (4%).

helpnetsecurity.jpg

 

Fidelis Cybersecurity Launches Automated Endpoint Detection and Response Delivered from the Cloud

To help provide security personnel with the visibility, context and automation required to investigate and resolve threats lurking on endpoints and to protect their organizations from cyberattacks, Fidelis Cybersecurity announced the availability of Fidelis Endpoint Cloud.

fidelis.jpg

 

How Computer Security Pros Hack the Hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

itnews.jpg

 

Combating Commonly Counterfeited Currencies

From fake dollars and pounds, to false pesos and euros and bogus rupees and yuan, the threat of counterfeit currency spans the globe. Advances in scanning and printing technology have made it easier than ever for counterfeiters to stay in business.

cumminsallison.jpg

~~~

Back to Top


Leaders Roundtable

Security:

Battling Security Fatigue – Working Towards Usable Security

 

Easy Solutions - http://www.easysol.net
Read Josh Schleicher's comments:
https://www.banktt.com/EasySolutions.pdf

 

 

 

Onbase by Hyland Software - http://www.onbase.com
Read Steve Comer's comments:
https://www.banktt.com/OnBase.pdf

 

LookingGlass Cyber Solutions - https://www.lookingglasscyber.com
Read A.J. Shipley's comments:
https://www.banktt.com/LookingGlass.pdf

 

Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:
https://www.banktt.com/MVi.pdf

 

NetWatcher - http://www.netwatcher.com
Read Scott B. Suhy's comments:
https://www.banktt.com/NetWatcher.pdf

 

Network Bix USA
 
Network Box - https://www.networkboxusa.com  
Read Pierluigi Stella's comments:

 

MVi
Nintex - https://www.nintex.com
Read Mike Fitzmaurice's comments:
https://www.banktt.com/Nintex.pdf

 

Security Compliance Associates - http://www.scasecurity.com
Read Jim Brahm's comments:
https://www.banktt.com/SCA.pdf

 

SentinelOne - http://www.sentinelone.com
Read Jeremiah Grossman's comments:
https://www.banktt.com/SentinelOne.pdf

~~~

Back to Top


Technology and Marketing

 

Spending on Credit Card Rewards Has Exploded

Credit card rewards have become increasingly lucrative, as credit card issuers battle for consumers. From 100,000 point sign-on bonuses to 6% cash back offers, it has never been a better time to be a credit card user.

businessinsider.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

Amazon Uses Its Machine Learning Tools for Lending

The e-commerce giant has (arguably) the most sophisticated ML toolset around that is uses for drone deliveries, online tailors, and its AWS offering. Turns out, Amazon’s lesser known operation – small business lending – is also powered by machine learning, Bank Innovation has learned.

bankinnovation.jpg

 

Western Union Reveals Pilot Coinbase Integration

Western Union is trialing an integration with digital currency exchange Coinbase, in which Western Union will appear within the web app of the exchange.

coindesk.jpg

 

Editing Transactions in Online/Mobile Banking

One basic feature missing from most online and mobile banking services is the ability to edit/annotate transactions. Some FIs support transaction and/or category editing in their PFM modules. But it’s very rare to see it within basic digital banking.

finovate.jpg

 

Video Banking Will Play an Important Role in the Branch of the Future

RBR’s new report entitled "Teller Automation and Branch Transformation 2017" shows that FIs in a number of countries are turning to terminals offering remote video transactions as part of their branch transformation strategies.

rbr.jpg

 

People Don’t Trust Robo Advisors with Finances

ING released the results of its latest international survey finding that while people are using their smartphones and tablets to perform banking tasks, they aren’t comfortable with giving up control of their finances to their computers.

pymnts.jpg

~~~

Back to Top


Internet Access

 

SD-WAN Traffic to Grow 44%, Cisco Study Finds

SD-WAN traffic is the fastest-growing segment of the overall enterprise WAN market, increasing at a 44% compound annual growth rate, while traditional WAN will grow at only a 5% rate. The healthy growth rate of SD-WAN is a partial vindication of the network virtualization trend. Virtual customer premise equipment (vCPE), a common element of SD-WAN, was expected to be one of the least difficult instances of virtual technology to deploy. Though it wasn’t the slam dunk everyone expected it to be, it was - to extend the metaphor - a relatively easy layup.

fiercetelecom.jpg

 

4 Tips for a Successful Virtual Network Deployment

As new technologies like software defined networking, cloud computing and the Internet of Things continue to grow in maturity and adoption, organizations are faced with transforming their networks to keep up with the changes.

networkworld.jpg

~~~

Back to Top


Call Centers

 

Give Callers What They Want: Fast Action and Human Interaction

Eight out of ten of consumers will consider switching to a competitor due to poor service. With the hype of artificial intelligence (AI) and other emerging technologies that help make organizations more efficient, it can be easy to lose sight of what really matters: delivering a great customer experience at every opportunity.

icmi.jpg

~~~

Back to Top

 

Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Position(*)
Invalid Input

E-Mail(*)
Invalid Email Address