Remove Authentication Remove Report Remove Security
article thumbnail

PSD2 Security Requirements Are Restricting Fintech Innovation

Forrester IT

I have recently released a new report looking at the second phase of the Payment Services Directive (PSD2) and its security requirements along with my colleagues Jacob Morgan and Andras Cser. Banks and financial institutions are currently hard at work building APIs and testing their Strong Customer Authentication (SCA) solutions.

Security 352
article thumbnail

Top 5 Security & Risk Reports in Q1 2020 (Not Written By Me)

Forrester IT

It is a humbling to work with a team of talented individuals like the ones I work with on Forrester’s Security & Risk team. This week, I’m highlighting 5 reports some of these fine folks published in Q1 that I got a lot of value out of, and I think you will too. Optimize […].

Report 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Network 210
article thumbnail

FCC proposes BGP security measures

Network World

Jessica Rosenworcel wants ISPs to tell her how they’re securing BGP (Border Gateway Protocol) , a critical system for routing internet traffic. The proposal aims to protect against bad actors who could pose a threat to national security and disrupt critical Internet infrastructure by exploiting BGP vulnerabilities, the FCC said Wednesday.

Security 192
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Nile unwraps NaaS security features for enterprise customers

Network World

Network-as-a-service startup Nile has added new zero-trust capabilities and tapped Microsoft and Palo Alto Networks to bolster its enterprise security services. It’s a zero-trust architecture featuring end-to-end encryption and automatic updates to ensure security patches are up to date.

Security 174
article thumbnail

Continued reliance on passwords continues to compromise data security

Tech Republic Security

IT leaders remain under pressure to balance security and authentication methods, yet this remains a challenge for most organizations, according to a new report by Thales.

Security 167