The Nevis CIAM Blog

filter-icon
Filter by

Sort

Newest
Biometric MFA – The Ace up Your Sleeve Regarding iGaming Security Sep 11, 2024 Nevis Security at G2E in Las Vegas Sep 10, 2024 An Indispensable Alliance: How CIAM Enhances the Role of CISO Aug 13, 2024 Nevis and Swiss Casinos revolutionise customer security in the iGaming sector Jul 29, 2024 Visit Nevis at Money20/20 in Amsterdam May 16, 2024 Systems Limited and Nevis Partner for Enhanced Security in Banking Sector Mar 28, 2024 Five Reasons for Companies to Rely on CIAM Mar 19, 2024 Nevis enters the channel business with Prianto as a new VAD Feb 19, 2024 The Future of CIAM - Five Key Trends in AI-Powered Authentication Dec 29, 2023 Botnets in Focus: Five Tips for Robust Cyber Defence Dec 26, 2023 5 Myths About MFA Prompt Bombing: How Companies Can Protect Themselves Dec 20, 2023 Nevis Security and OEDIV SecuSys announce a strategic partnership Dec 15, 2023 Mobile Money in MEA: Transformation, Opportunities, and Challenges Dec 14, 2023 Embedded Finance: Making Online Transactions Even Simpler Dec 4, 2023 Financial Advice in Transition Through AR, Security, Fraud Prevention Nov 27, 2023 The Evolution of Biometrics: From Fingerprints to Emotion Recognition Oct 31, 2023 WAVZ and Nevis announce Partnership Oct 24, 2023 MITM Attacks Decoded: Protective Measures and Prevention Tips Oct 13, 2023 The Customer in Focus: Self-Sovereign Identity, Data Sovereignty, CIAM Sep 22, 2023 Nevis unveils its new partner programme at it-sa 2023 Sep 20, 2023 How To Employ MFA To Make Crypto Gambling Even More Secure Sep 13, 2023 How Self-Service Solutions Lead Insurance Companies to Success Sep 6, 2023 Biometric Data Security: Your Guide to Selling a Smartphone Safely Aug 31, 2023 Biometric Recognition: Advantages of AI for Authentication Processes Aug 21, 2023 Glossary: Delegated Authentication Aug 9, 2023 Customer Due Diligence: The Global Fight Against Financial Crime Aug 2, 2023 Wrong Connection: How Dangerous Are Public Wi-Fi Networks? Jul 27, 2023 The Key To Secure and Convenient Authentication Jul 21, 2023 More Effective Fraud Detection With Geo-Location And Geo-Velocity Jul 10, 2023 Seamless Security With Continuous Authentication Jun 27, 2023 Using CIAM To Combat Money Laundering and Terrorist Financing Jun 23, 2023 Tackling Globalized Gambling: Operator Compliance Strategies Jun 12, 2023 Zero Friction: The Future of Security Jun 1, 2023 A Scalable CIAM Solution That Grows With Your Business May 24, 2023 Authentication for Core Banking: Secure and Customer-Focussed May 16, 2023 Effective Protection Against Bot Attacks May 9, 2023 Product Customisation: The Advantages of Custom Branded Authentication May 2, 2023 CIAM and Core Banking: Personalised and Secure Banking Services Apr 27, 2023 Secure Access Management for Applications and APIs Apr 14, 2023 Seamless Access and Authentication Processes With Identity Federation Apr 6, 2023 Where Did UK-Operating Banks Stumble with AML & How Can They Improve? Apr 3, 2023 DORA: New IT Security Measures for the Financial and Insurance Sector Mar 21, 2023 Sectoral Identity Providers: Secure Solution for Health Insurers Mar 15, 2023 Everything You Need To Know About Adaptive Authentication Mar 13, 2023 Fraud Prevention and Fraud Detection for the Banking Sector Mar 7, 2023 Identity Providers – An Overview of Their Roles and Functions Feb 24, 2023 Seamless Integration With the Help of SDKs Feb 13, 2023 Friendly Fraud in Gambling – Actually Not Friendly at All Jan 31, 2023 Can Blockchain Technology Revolutionise the Insurance Industry? Jan 24, 2023 How Secure Is an Identity Check Based on Social Login? Jan 11, 2023 Personal Customer Journey: But in Compliance With Data Protection Jan 3, 2023 Data Security Reimagined – revDSG Dec 6, 2022 SAML 2.0– Secure Login Standard for Single Sign-On Nov 29, 2022 EPIc Success or EPIc Fail? The European Payments Initiative Nov 8, 2022 BYOI and SSO For a Smooth Digital Login on Websites Nov 3, 2022 One, Two…PSD3: What the Payment Services Market Can Expect Oct 25, 2022 The Hidden Danger of Mobile Banking: Remote Access Trojans Oct 17, 2022 Permission Marketing – Not Just for Electronic Health Records Oct 11, 2022 Selfie Apps and Filters – A Real Threat to Your Online Safety? Sep 20, 2022 How Identity Orchestration Makes Human-Centric Identity Fly Sep 6, 2022 Watch Out for Keyloggers – The Spies in Your Keyboard! Aug 30, 2022 SCA: Better Safe Than Sorry or Too Much of a Good Thing? Aug 18, 2022 Personal Data Under Attack: Raccoon Stealer Is Back! Aug 12, 2022 FIDO – Passwordless Authentication with Privacy Priority Aug 9, 2022 Internet of Medical Things – The Future of Healthcare Aug 4, 2022 From Bartering to Cryptocurrencies: The History of Money Jul 26, 2022 How To Protect Children’s and Young People’s Data? Tips for Parents Jul 12, 2022 The Future Without Passwords With FIDO-Compliant Passkeys Jul 8, 2022 Is Our Own Smartphone Eavesdropping on Us? Jun 28, 2022 Some Reasons Why AutoIdent Beats VideoIdent Jun 7, 2022 The Economic Advantages of Passwordless Authentication Jun 1, 2022 The eIDAS Regulation Is Digitalising the European Internal Market May 24, 2022 Putting Zero Trust Into Practice May 17, 2022 How Secure Is eID in Practice? May 2, 2022 How Much Does Resetting Passwords Cost Your Company? Apr 28, 2022 Everything You Need To Know About KYC Apr 25, 2022 What’s the State of Play With the eID in the DACH Region? Apr 21, 2022 Basic Principles of the Zero Trust Strategy Apr 14, 2022 Self-Sovereign Identity: Managing Your Own Identity Securely Apr 11, 2022 Social Engineering – Hazardous Psychological Manipulation on the Web Apr 5, 2022 When Is It Worth Taking Out Personal Insurance Against Cyberattacks? Mar 31, 2022 Online Banking: How Secure Are TAN Procedures? Mar 24, 2022 Identity Theft on Social Media: The New Everyday Occurrence Mar 22, 2022 Incorporating Hacker Defence Into Training Programmes. Useful? Mar 7, 2022 Self-Sovereign Identity: The Foundation of the Digital Wallet Mar 3, 2022 These Are the Hidden Use Cases of the New Smart eID Feb 24, 2022 Smart eID: Turning a Mobile Phone Into an Identity Card Feb 21, 2022 The Risks of Sticking With Password-Protected Authentication Feb 17, 2022 Online Banking: What Users Really Care About in Terms of Security Feb 14, 2022 Password Security Fail: Are We Unteachable? Feb 1, 2022 ID Verification and Identity Protection Jan 31, 2022 The Never-Ending Evolution of Data Protection and Data Autonomy Jan 28, 2022 Open Banking: The Secure Future of Finance Jan 24, 2022 Glossary: Identity Spoofing Jan 19, 2022 How Secure Is Two-Factor Authentication? Jan 13, 2022 The Evolution of Security With FIDO Protocols Jan 6, 2022 Insurance Companies: What Customers Expect in Terms of Security Jan 3, 2022 What Is Consent and Privacy Management and Why You Need It Dec 13, 2021 Five Things That Digital Customers Expect From Their Bank Dec 9, 2021 How Online Casinos Are Winning the Big Data Game Dec 6, 2021 Glossary: Multi-Factor Authentication Nov 29, 2021 Credential Stuffing in Full Swing During Black Friday & Cyber Monday Nov 25, 2021 How To Choose the Right CIAM Solution Nov 18, 2021 Optimising the Customer Journey With CIAM Nov 11, 2021 What You Didn’t Know About Passwordless Authentication Oct 25, 2021 Definitely a Good Customer Experience 4.0 Oct 14, 2021 Identification, Authentication, Authorisation. Simply Explained. Oct 8, 2021 IT Buzzwords: From IAM and CIAM to PAM Sep 27, 2021 B2B Websites: How To Combine Security and User-Friendliness Sep 16, 2021 Passwords as a Security Factor – MFA As Optimal Protection Sep 9, 2021 Roulette & Black Jack – Playing Safely Due to Reliable Authentication Aug 30, 2021 Glossary: Identity and Access Management Aug 27, 2021 A Partnership for Authentication in the Healthcare System Aug 25, 2021 Identity and Access Management in Mechanical and Plant Engineering Aug 19, 2021 Easy Login With CIAM and Multi-Factor Authentication Aug 16, 2021 Easy and Secure Access to Financial Websites Aug 13, 2021 Authentication: On-Premises or Cloud? Aug 10, 2021 71 per Cent of Germans Mistrust the Security of Face ID Aug 5, 2021 Two-Factor Authentication and the Battle Against 123456 Aug 3, 2021 Omnichannel: Combine the Optimum CX With Maximum Security Jul 23, 2021 Social Engineering: Who’s Afraid of Robin Sage Jul 15, 2021 How Critical Is an Easy Login Process? May 26, 2021 How Secure Is Fingerprint Scanning (TouchID) on Your Smartphone May 20, 2021 What is Homomorphic Encryption (FHE)? How Is It Changing Data Privacy? May 12, 2021 What Are the Characteristics of Biometric Authentication? May 6, 2021 How To Protect Your Networks and Data From Golden Ticket Attacks Apr 20, 2021 How Do I Effectively Protect Myself From Man-in-the-Middle Attacks? Feb 19, 2021 Interesting Facts About Advantages and Disadvantages of Single Sign-On Feb 15, 2021 How the Nevis Authentication Cloud Protects Teenagers on the Internet Jan 27, 2021 How Safe Is Face ID? Jan 5, 2021 IAM Combines Personalised Customer Experience and Privacy Oct 25, 2020 Digital Identity Verification as a Competitive Edge Oct 25, 2020 Why You Should Rely on Passwordless Authentication Oct 25, 2020 What Is Single Sign-On and Why Do I Need It? Oct 25, 2020 With CIAM to Trusting and Profitable Business Relationships Oct 25, 2020 What Is a Digital Identity? Oct 25, 2020 How Does Identity Management (IDM) Work? Oct 25, 2020 Two-Factor Authentication vs. Multi-Factor Authentication Oct 25, 2020 What Is the Difference Between Data Security and Data Privacy? Oct 25, 2020 How To Use Identity and Access Management Systems Efficiently Oct 23, 2020

Stay up to date.
Subscribe to our blog on CIAM, strong customer authentication and cybersecurity.