.
HomeSecurity

Security

Getting eKYC right – tips from the aviation community

Know Your Customer (KYC) on-boarding processes that involve the capture and verification of data...

The Power of Digital Identity Trust Frameworks to Mitigate Risks in Know Your Customer and Anti-Money Laundering Practices

Online transactions are becoming the norm, and establishing trust and ensuring the authenticity of...

Use Identity Threat Detection and Response to Better Prepare for Cyberattacks

Security and risk management (SRM) leaders must add identity threat detection and response (ITDR)...

Realizing the transformational potential of digital wallets depends on assurance

Societal adoption of digital wallets can revolutionize the global economy by transforming how customers...

Monitor for new and changed cyber regulations

Introduction Regulatory monitoring services are now a requirement for GRC teams. More and more jurisdictions...

Emergency Preparedness Training with New Technology

Emergencies can happen at any moment. Emergencies come in many forms, I break them...

Why Graph Databases are Ideal forRisk, Fraud and Compliance

Interdependence in Risk, Fraud and Compliance Once of the challenges for applications that deal with...

Are you ready for the payment revolution?

The payment revolution has already begun, with the likes of cryptocurrency, mobile wallets, and...

Hot Topics

Translate »