PROFILE OF FIREBLOCKS (DIGITAL ASSETS CUSTODY)
A link to Fireblocks, a company specializing in the custody and protection of digital assets including crypto currencies.
PROFILE OF FIREBLOCKS (DIGITAL ASSETS CUSTODY) Read More »
A link to Fireblocks, a company specializing in the custody and protection of digital assets including crypto currencies.
PROFILE OF FIREBLOCKS (DIGITAL ASSETS CUSTODY) Read More »
Open Banking within alternative credit scoring; enabling credit bureaus and other providers to access bank account transaction information.
This article describes how using a cold wallet reduces the risks of hacking and unauthorized access to digital assets.
HOW TO PROTECT YOUR CRYPTOCURRENCY WITH A COLD WALLET | TREND MICRO NEWS Read More »
DataVisor, the world’s leading AI-powered fraud and risk platform, announced the release of its newest solution to prevent instant payments fraud.
A link to Netsuite, Oracle’s cloud-based solution used by many fintechs in the money transfer space, e.g., Paysend.
PROFILE OF NETSUITE (ORACLE) Read More »
A list and description of fintechs in Africa, many of which are involved with mobile wallets and money transfer.
FINTECH UNICORNS IN AFRICA Read More »
A video explaining how the Paysend money transfer service works. Paysend is a financial technology platform headquartered in the UK that enables any bank card (Visa or MasterCard) to send and receive money worldwide.
PAYSEND: HOW IT WORKS (VIDEO) Read More »
A slide showing how push and pull payments function, with the differences shown graphically (example with Visa).
PUSH VS PULL PAYMENTS Read More »
In this brief adapted from a Linkedin post, Monica Jasuja describes the difference between push and pull payments.
WHAT YOU NEED TO KNOW ABOUT PUSH AND PULL PAYMENTS Read More »
In this publicly available GSA report, authored by Teddy Kyung Lee, central bank digital currency (CDBDC) is defined, and contrasted with crypto. In addition to basic definitions, there is an emphasis on how CBDC wallets must be secured.
CBDC WALLETS AND THE SECURITY REQUIREMENTS Read More »