RBI has mandated that all banks migrate to Aadhaar-based biometric authentication for electronic payment transactions by June 30. But some information security experts question whether the the technology can handle the potential volume of transactions.
How Are Leading Institutions Finding the Balance Between Effective Cybersecurity and a Seamless Customer Experience?
It's every banking institution's quandary: How do you introduce the right cybersecurity controls to protect customer accounts and transactions - but without introducing new hurdles that might...
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
Biometric authentication has emerged as one of the more convenient methods of authentication, particularly with the increasing ubiquity of mobile devices with a variety of high quality sensors. Financial institutions can realize cost savings and improved customer experience by deploying biometric authentication. This...
Implementing a successful cybersecurity strategy in light of advanced threats calls for operationalizing three key principles: visibility, identity and risk, says Zulfikar Ramzan, chief technology officer at RSA.
Warning to parents and guardians: Beware of collecting, storing or sharing your child's biometric information - including fingerprints and DNA - even if you're creating a so-called "Child ID Kit," because the data is a natural target for identity thieves.
A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?
In 2013, Apple introduced Touch ID, a biometric technology that brought convenient fingerprint recognition to a mass consumer
audience. Banks have gravitated to Touch ID
because it provides them with a device-based technology
they may leverage to secure the mobile banking platform, and,
in turn reduce their costs...
Banks can no longer view mobile banking as a "new channel" or optional service. It is now the preferred form of banking for an entire generation of customers and, arguably, the single biggest banking innovation since the advent of the ATM.
Banks in particular have gravitated to Touch ID technology because it...
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
For contact centers, the effectiveness of security questions is declining. Professional fraudsters can successfully answer questions using stolen customer records from growing cyberbreaches and customer experience is impacted by adding more security questions.
Is there a way for more powerful fraud detection...
The White House Summit on Cybersecurity and Consumer Protection late last week served as the stage for more than a dozen companies and trade groups to announce new initiatives aimed at securing Internet transactions and payments and reducing fraud.
Part 1 - Voice Biometrics in the Call Center
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process...