The card is an extension of your institution, so it's your FI that cardholders look to for protection. Losing their trust is a big problem — and a big expense
It's time to pause and celebrate 2014. In somewhat muted terms, perhaps, but we made it, and the ubiquitous corner ATM is still being well used.
The ATM Security Association for Enhanced Technology asks members to join a common cause against an underworld of uncommonly determined ATM fraudsters and cyberthieves.
Apple Pay, cybercrime and self-service innovation were top-of-mind in the ATM industry over the last month. But reader interest wandered over to low-tech topics, as well.
Given the successful deployment and ready acceptance of biometrics elsewhere in the world, greater use of this technology in the US is inevitable.
Tokenization is a good move forward as it builds on the gains of PCI and the global adoption of EMV standards.
Taken together, these three key pieces of security technology can ensure that the good guys continue to stay one step ahead of the fraudsters.
One-third of the participants in a recent study said their company doesn't have a mobile security program; of the two-thirds that do have a program, 75 percent of respondents said security is lax.
Being prepared but having the wrong tools doesn't really count for much when trouble truly develops ...
At BAI Retail Delivery, FBI Special Agent Patrick Geahan described five types of cyber attacks and one mistake that can cost an organization millions.