Open Banking: Security considerations & potential risks

Open Banking: Security considerations & potential risks

26-04-2018fortconsultENWhitepaper
The concept of Open Banking is an innovative one. However, as with any new developments surrounding sensitive financial information it is imperative to assess the security implications of these actions. Matthew Pettitt discusses the pros and cons of the planned implementation and potential risks of Open Banking in NCC Group’s new whitepaper, along with an exploration of the alternatives available.Download the whitepaper
registrering nødvendig

Ved download af dette whitepaper accepterer du, at leverandøren af whitepaperet kontakter dig på din oplyste e-mailadresse eller telefonnummer med yderligere information om leverandørens ydelser relateret til whitepaperet

Sorter efter:
 
Vis:

{{item.texts[0].title}}

{{item.texts[0].title}} {{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.language}}{{item.texts[0].class}}
 

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

Red Hat frigiver Kubernetes-stak til Java i containere

Open source container-software understøtter bunker af frameworks og biblioteker.

Google undersøges af myndigheder for massiv indsamling af sundhedsdata

Millionvis af amerikanske patienters sundhedsdata overføres til it-giganten Google. Amerikanske sundhedsmyndigheder vil nu se nærmere på...

CFCS udgiver ny vejledning om sikkerhed i industrielle kontrolsystemer

Industrielle kontrolsystemer er oplagte mål for mange typer hackere. Succesfulde angreb både kan gøre stor økonomisk eller strategisk skade.

Alt skal genskabes: Inuit-selvstyre lagt ned af ransomware

Den canadiske stat nægter at betale løsesummen, så nu skal alt bygges op fra bunden igen. Canadisk medie skriver, at dette er første gang,...

Professionelle gamere køber i stigende grad ulovlig digital doping

Der er begyndt at være store penge i at spille computerspil på professionelt plan. Det åbner for, at det kan svare sig at købe og sælge...

Whitepapers

RSA NETWITNESS LOGS

RSA NETWITNESS LOGS

RSA NetWitness Logs is a security monitoring and forensics tool that...

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

Successful risk management today may start with governance, risk and...

Harden your attack surface

Harden your attack surface

F-Secure Radar is a turnkey, enterprisegrade vulnerability scanning and...
Tomorrow's security delivered today

Tomorrow's security delivered today

Cyber security never stops. New attackers, tactics, and threats emerge every...
More control more security

More control more security

The amount and sophistication of cyber attacks is increasing.
And any...
Detecting targeted attacks with broad context detection

Detecting targeted attacks with broad context detection

Cyber security is in the midst of a paradigmshift. Targeted attacks are...
Best practices with BYOD

Best practices with BYOD

In today’s modern society the requirement for employees to be based within a...
Open Banking: Security considerations & potential risks

Open Banking: Security considerations & potential risks

The concept of Open Banking is an innovative one. However, as with any new...