Remove Definition Remove Security Remove Technology
article thumbnail

Two Perficient Colleagues Quoted in Forrester Report on Emerging Insurance Technologies

Perficient

Perficient insurance experts were interviewed for Forrester’s report, “ The Top Emerging Technologies In Insurance, 2024 ,” and discussed technologies expected to emerge in the insurance industry over the next five years, considering them now, and in the short-term, medium-term, and long-term future. Interested in learning more?

article thumbnail

Banks’ Definitive B2B Payments Guide To Sibos

PYMNTS

Corporates have growing expectations for faster, more efficient and more secure B2B payments — whether their money is moving from one business unit to another or one country to another. Payments Speed and Security. As financial institutions gather for this year’s Sibos conference kicking off in London today (Sept.

Payments 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why The Password Isn’t Quite Dying, But Is Definitely Diminished

PYMNTS

The same should be true of securing individual data, he said, but consumers are a little more complicated and have demands far more varied by context. It might be a matter of consumers using the mobile technology in their hands — and requiring a biometric marker like a fingerprint scan or sending a selfie.

article thumbnail

AI Regulations for Financial Services: Federal Reserve

Perficient

Each current or planned AI use case undergoes a thorough review and assessment by the CAIO and the AI Program team to determine whether the use case meets the definition of safety- or rights-impacting AI as defined in section 6 of OMB M-24-10. Considerations for resourcing, security controls, testing, and validation plans are also reviewed.

article thumbnail

When and by Whom Should TRACE Transactions Be Reported? (Part 4 of 6)

Perficient

All broker-dealers who are FINRA member firms have an obligation to report transactions in TRACE-eligible securities under an SEC-approved set of rules. TRACE time reporting requirements have numerous intricacies based on the security, the issuance status of the security, and the time of day reporting occurs.

Report 294
article thumbnail

Hacker Attack Exploits Security Hole In Token Exchange

PYMNTS

A cyberattack on what’s been described as a “decentralized” token exchange reportedly has led to a $58,000 theft and an illustration of a “shocking security vulnerability.”. The EOS network recently took the top spot in an evaluation of blockchain networks by China’s Ministry of Industry and Information Technology (MIIT), CoinDesk reported.

Security 186
article thumbnail

How Mobile Technology Is Changing Insurance Claims

PYMNTS

“I think one of the largest reasons [insurers are still using checks] is because claim payments, the paying out of a claim, is [a] loss of money, and it is really hard for companies to focus or invest resources in a place in which you are losing money already,” Michele Schmitt, senior product manager for B2B insurance technology firm Tr?v

Mobile 198