Remove Applications Remove Authentication Remove Insurance Remove Software
article thumbnail

Madrona backs WaFd Bank spinout developing consumer software for regional banks

GeekWire

A new banking software startup spun out of Washington Federal Bank (WaFd) wants to help digitize consumer-facing products used by regional banks across the U.S. The idea was to help develop and deploy new software at a faster rate. Many banks are hesitant to make a transition from their current software provider.

Banking 116
article thumbnail

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Given the Health Insurance Portability and Accountability Act (HIPAA) requirement for secure communication of Protected Health Information (PHI), a spotlight has been placed on the support for secure messaging. Secure Messaging Requires Authentication and Secure Networks. Patient Portal and Messaging Authentication.

Security 267
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Impact of technology on insurance industry

Hacker Earth

Like every other industry, the global insurance sector, worth over $5 trillion, has undergone an immense overhaul because of disruptive technologies in recent years. According to PwC’s 2017 Global InsurTech Report, the challenges the insurance industry faces in their ability to innovate are. Talent (87%). IT security (53%). Blockchain.

article thumbnail

We Need A National Cybersecurity Strategy That Everyone Can Implement

CTOvision

So here’s three things the nation can do to make it less vulnerable to cyber attacks: 1/ Implement 2-Factor Authentication. Basic: Implementing two-factor authentication is the simplest mitigation against credential theft. Basic: Application data stores, email servers and collaboration applications should all have their data encrypted.

Strategy 150
article thumbnail

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

CIO Business Intelligence

Password-based authentication is likely the most widely used method of authenticating users to online services. Password-based authentication is used because it is easy to understand and implement. They provide multifactor authentication (MFA) without the usual burden on the user. on a user’s other online accounts.

article thumbnail

Governance and Fighting the Curse of Complexity

CIO Business Intelligence

Shadow IT introduces systems and applications that are often outside of an enterprise’s catalog of IT tools. Authentication. Cyber insurance. It means rock-solid identity management so that systems, data, and applications are accessed by the right people – and IP addresses – at the right time. Password strategies.

article thumbnail

How Serious Is The Lack Of Machine Learning Talent?

The Accidental Successful CIO

Just about every part of the business is starting to be infused with AI based software that is designed to help humans make better decisions by wading through the reams of data that threatens to overwhelm most businesses. Their future applications need to be equipped with AI in order to better meet the needs of their customers.