APPLE FINTECH STRATEGY MAP (CBINSIGHTS)
A slide from CBInsights showing graphically Apple’s payment strategy.
APPLE FINTECH STRATEGY MAP (CBINSIGHTS) Read More »
A slide from CBInsights showing graphically Apple’s payment strategy.
APPLE FINTECH STRATEGY MAP (CBINSIGHTS) Read More »
An article from CBInsights showing the emerging scale of APPLE in payments and the challenges it will present for incumbent players.
APPLE FINTECH STRATEGY MAP (CBINSIGHTS) Read More »
This article from Bloomberg describes how if approved by regulators,the token could speed up transactions and mark an expansion of JPMorgan?s blockchain push.
JPMORGAN IS EXPLORING BLOCKCHAIN-BASED DEPOSIT TOKEN FOR PAYMENTS, SETTLEMENTS Read More »
This case study describes how Zelle, seeking to improve its MDR capabilities, evaluated three vendors in the space: TruShield,eSentire, and Arctic Wolf.
ARCTIC WOLF HELPS ZELLE LLP RAISE SECURITY POSTURE AND ENSURE CLIENT CONFIDENCE Read More »
A link to Fireblocks, a company specializing in the custody and protection of digital assets including crypto currencies.
PROFILE OF FIREBLOCKS (DIGITAL ASSETS CUSTODY) Read More »
Open Banking within alternative credit scoring; enabling credit bureaus and other providers to access bank account transaction information.
This article describes how using a cold wallet reduces the risks of hacking and unauthorized access to digital assets.
HOW TO PROTECT YOUR CRYPTOCURRENCY WITH A COLD WALLET | TREND MICRO NEWS Read More »
DataVisor, the world’s leading AI-powered fraud and risk platform, announced the release of its newest solution to prevent instant payments fraud.
A link to Netsuite, Oracle’s cloud-based solution used by many fintechs in the money transfer space, e.g., Paysend.
PROFILE OF NETSUITE (ORACLE) Read More »
In this publicly available GSA report, authored by Teddy Kyung Lee, central bank digital currency (CDBDC) is defined, and contrasted with crypto. In addition to basic definitions, there is an emphasis on how CBDC wallets must be secured.
CBDC WALLETS AND THE SECURITY REQUIREMENTS Read More »