We look at how the Trusted Services Hub can bridge the fragmentation endemic in mobile payments and accelerate deployments and consumer acceptance of the new services
Posts from US
Posted on 29th Jan 2015 by Dominique Brulé in Mobile
Posted on 28th Jan 2015 by Jean-Francois Ouillet in Mobile
The average consumer uses 25 different usernames to log in to all their online services, at a cost of convenience and security. How can we address the challenge, improve the user experience and increase our overall security from the hacker threat? Mobile Authentication is one key answer.
Posted on 28th Jan 2015 by Nicole Williams in Financial Services
As the EMV migration is in full swing across the United States, contactless and mobile payment opportunities continue to grow, too. The wider availability of mobile payments like Apple Pay and SoftCard is driving this popularity as well. When contactless payment programs like these incorporate the security of EMV through the use of a secure […]
Posted on 27th Jan 2015 by Philippe Benitez in Financial Services
The Identity Theft Resource Center reported that data breaches hit an all-time high of 783 in 2014, and in many instances payment card details were compromised along with personal information like email addresses, phones numbers, or physical addresses. This meant that more payment cards had to be reissued due to breaches in 2014 than in […]
Posted on 23rd Jan 2015 by Shannon Taylor in Mobile
The Bill and Melinda Gates Foundation’s 2015 Annual Letter, covering important predictions for the impact of technology in the next 15 years, has highlighted the global benefits of digital banking. Here, we take a look at what those key benefits are.
Posted on 14th Jan 2015 by Manfred Kube in M2M
In another post looking at one of our IoTMaker entries in detail, we delve into the brilliant e-Pot idea from Mohamed Khalil Zendah.
Posted on 12th Jan 2015 by Maria Barbieri in Enterprise Security
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 23rd Dec 2014 by Bernd Eckenfels in M2M
After spotting a great post from the Wireless Noodle covering a few IoT highlights from this Christmas season, we’ve decided to put together our own IoT Christmas wish list.
Posted on 17th Dec 2014 by Shannon Taylor in Financial Services
Traditional commerce is no longer the only piece in the payments puzzle. Innovation in payments is happening so quickly that it’s hard to imagine how all of these emerging technologies are going to work together – or will one technology dominate? Which way will the industry go? Will cloud-based payments take over, or will secure-element […]
Posted on 16th Dec 2014 by Bernd Eckenfels in M2M
An introduction to our M2M Holiday Countdown Calendar – instead of chocolate, readers will receive a nugget of M2M knowledge. There are also chances to win an iPad Air for those who answer the trivia questions correctly.