Remove Security Remove Technology Remove Training
article thumbnail

Fraud typologies all financial institutions should know

Abrigo

The technology used to perpetrate financial crimes may be changing, but these common fraud typologies aren't going anywhere. Synthetic identity fraud Fraudsters combine real and fake personally identifiable information (PII) to create fictitious identities used to open bank accounts, secure loans, or conduct other fraudulent activities.

Fraud 221
article thumbnail

Cloud Takes Center Stage at 2023 Bank Automation Summit

Perficient

Security Traditionally, information was said to be most secure when separated and segmented. However, the cloud’s structure makes data segmentation more complex and potentially more vulnerable if the correct security measures are not followed. For many, this means starting their journey using microservices.

Data 492
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Assess Your Red Hat Skills

Perficient

There are 17 training assessments available for everything from Red Had Enterprise Linux and security to OpenShift and microservices. You can take an individual assessment to evaluate your skills by role or product, and receive a personalized training recommendation. Click here to learn more.

Training 322
article thumbnail

Generative AI in credit risk management: A game changer for loan review

Abrigo

For new analysts, AI acts as a built-in training tool, providing real-time guidance and helping them get up to speed faster. Kirby said, Loan Review Assistant is a wonderful training tool for newer analysts, allowing us to reduce the time needed to onboard them while maintaining high-quality risk assessments.

article thumbnail

Two Perficient Colleagues Quoted in Forrester Report on Emerging Insurance Technologies

Perficient

Perficient insurance experts were interviewed for Forrester’s report, “ The Top Emerging Technologies In Insurance, 2024 ,” and discussed technologies expected to emerge in the insurance industry over the next five years, considering them now, and in the short-term, medium-term, and long-term future.

article thumbnail

How Perficient and Microsoft Can Help You Return to Work

Perficient

We work with you to accelerate your development practices in the cloud by combining training and direct hands-on team coaching to rapidly introduce DevOps practices and encourage joint agile. Keep your crucial legacy applications secure and reduce costs by migrating them to Microsoft Azure with our Application Migration Accelerator.

Strategy 429
article thumbnail

Six Ways to Protect Yourself and Your Family on Data Privacy Day

Perficient

As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place to protect colleague and client information, but what about the everyday person?

Data 535