In combination, the EU’s Second Payment Services Directive (PSD2) – and the European Banking Authori…
It’s true, isn’t it? The more passionate about a task you are, the more likely you are to succeed. Even doing the dishes can be a chore or a fun twenty minutes reviewing the day with a loved one. Same with IT projects! I’ve been involved in some REALLY exciting IT advances. Don’t get me … Read more
A former National Security Agency contractor pleaded guilty Tuesday to espionage, becoming the first person to be prosecuted under the Trump administration for leaking classified information.
“A resume should be viewed as an opportunity to grab a recruiter’s eyes in 30 – 90 seconds…not as the full story you would tell in an interview. Therefore, you want to be concise and focus on four key components.” Sarah Williams is the Career Development Graduate Intern at […] The post Resume Tips … Read more
Martin works for a large company that uses G Suite where the tech team can accesses employees’ emails. Can he prevent this? I work for a large company and use the Gmail set up for my account. As a senior manager, I have many confidential conversations internally and externally via email. I have found out … Read more
The Financial Conduct Authority (FCA) has today launched a consultation on a package of measures designed to protect consumers, improve engagement and promote competition in the retirement income market.
The Financial Conduct Authority (FCA) has today published an update on its Strategic Review of Retail Banking Business Models.
John Lord says doing so would be ‘completely illegal’ and the telco would not flout Australian laws Huawei would refuse to hand over data on Australian users to China because complying with such an order would be “completely illegal”, its Australian chairman has claimed. John Lord made the comment at the National Press Club on … Read more
Mozilla is testing a new tool that securely checks to see if users’ accounts have been hacked.
Want to know more about the different types of authentication? When is it appropriate to use hard tokens v. soft tokens, or is a combination more suitable? To learn more about this, tune in today to the webinar on soft token authentication from OneSpan, formerly Vasco, hosted by Bank Innovation at 2 PM ET. In … Read more