PROFILE OF CONSULT HYPERION (IDENTITY, PAYMENTS)
A link to Consult Hyperion, a UK-based company specialized in identity for digital payments.
PROFILE OF CONSULT HYPERION (IDENTITY, PAYMENTS) Read More »
A link to Consult Hyperion, a UK-based company specialized in identity for digital payments.
PROFILE OF CONSULT HYPERION (IDENTITY, PAYMENTS) Read More »
A link to Giesecke & Devrient, a Munich-based company specializing in data security and connectivity.
PROFILE OF GIESECKE & DEVRIENT (DATA SECURITY, CONNECTIVITY) Read More »
A link to Fireblocks, a company specializing in the custody and protection of digital assets including crypto currencies.
PROFILE OF FIREBLOCKS (DIGITAL ASSETS CUSTODY) Read More »
This article describes how using a cold wallet reduces the risks of hacking and unauthorized access to digital assets.
HOW TO PROTECT YOUR CRYPTOCURRENCY WITH A COLD WALLET | TREND MICRO NEWS Read More »
A link to Netsuite, Oracle’s cloud-based solution used by many fintechs in the money transfer space, e.g., Paysend.
PROFILE OF NETSUITE (ORACLE) Read More »
A slide showing the developments in fintech that attract regulatory interest.
AREAS OF INTEREST FOR FINTECH REGULATION Read More »
A video explaining how the Paysend money transfer service works. Paysend is a financial technology platform headquartered in the UK that enables any bank card (Visa or MasterCard) to send and receive money worldwide.
PAYSEND: HOW IT WORKS (VIDEO) Read More »
A slide showing how push and pull payments function, with the differences shown graphically (example with Visa).
PUSH VS PULL PAYMENTS Read More »
In this brief adapted from a Linkedin post, Monica Jasuja describes the difference between push and pull payments.
WHAT YOU NEED TO KNOW ABOUT PUSH AND PULL PAYMENTS Read More »
In this publicly available GSA report, authored by Teddy Kyung Lee, central bank digital currency (CDBDC) is defined, and contrasted with crypto. In addition to basic definitions, there is an emphasis on how CBDC wallets must be secured.
CBDC WALLETS AND THE SECURITY REQUIREMENTS Read More »