![PSD2: How to Perform Dynamic Linking in a Compliant, Convenient Way](/sites/default/files/2019-11/Dynamic-Linking-Blog.png)
PSD2: How to Perform Dynamic Linking in a Compliant, Convenient Way
One of the most discussed requirements of the final Regulatory Technical Standards (RTS) on Strong...
![Windows logon with push notification](/sites/default/files/blog/images/feature-image/WindowsLogon-BlogpostThumb.jpg)
It’s Time to Migrate to Windows Logon with Push Notification
In light of constantly evolving cybersecurity risks, businesses must take strong measures to secure...
![A pair of hands holding and swiping an unlock pattern on a mobile device](/sites/default/files/blog/images/feature-image/swipe.jpg)
Behavioral Biometrics – A Discreet Layer of Security for Mobile Apps
Mobile banking apps and the devices they run on are increasingly at risk for compromise by cybercriminals...
![Moving Multi-Factor Authentication to the Cloud](/sites/default/files/2022-03/Moving-Multi-Factor-Authentication-to-the-Cloud-landing-page-image-1.png)
Best practices for switching from hardware to software tokens
The smartphone has become indispensable. According to Deloitte’s latest Global Mobile Consumer Trends 1...
![PCI DSS 3.2 Compliant](/sites/default/files/blog/images/feature-image/PCI-DSS-3.2.jpg)
Multi-factor Authentication to Comply with PCI DSS 3.2
On February 1, 2018, Requirement 8.3 of the Payment Card Industry Data Security Standard ( PCI DSS 3.2 )...
![Androids](/sites/default/files/blog/images/feature-image/android-malware-100564633-large.jpg)
How to Stop the Menace of Android Rooting Malware Attacks with RASP
One of the key security issues facing organizations that support Android devices is the risk of rooting...
![](/sites/default/files/blog/images/feature-image/Rise-of-Smart-Authentication.jpg)
The Rise of Smart Authentication
It’s the 21st century marketing mantra: Never underestimate the power of ‘smart.’ After all, we have...
![SMS Authentication](/sites/default/files/blog/images/feature-image/SMS-Auth.jpg)
PSD2: Is this the End of SMS-based Authentication?
Banks and payment service providers sometimes rely on SMS to verify the identity of a person who wishes...