By Jacob Ideskog, CTO at Curity

The adoption of Open Banking has increased rapidly over recent years and has had a revolutionary impact on financial institutions and on the experience consumers have when interacting with finance products. According to the OBIE 5 million people are now using Open Banking in the UK, as the benefits of the new products and services  begin to be recognized by consumers and businesses alike.

However, the rapid rise of Open Finance has also coincided with concerns about the compliance and security risk that it poses. Curity’s latest report ‘Facilitating the Future of Open Finance’ revealed that over 70% of organizations globally are concerned with security related issues associated with Open Banking. It’s clear that this is a significant hurdle that still needs to be overcome if the adoption of Open Banking is to continue its rise.

The cybersecurity sector has the opportunity and means to alleviate fears and be at the forefront of the adoption of this revolutionary technology.

Addressing and Alleviating Security Concerns

A key concern amongst businesses is the extensive involvement of third-party providers that Open Finance requires and the heightened security risks associated with this, as over 65% of organizations view this as a top security concern. Additionally 62% of organizations have concerns with outdated security systems that don’t support securely sharing data.

However such concerns, whilst understandable, don’t recognize the current capabilities of security solutions available such as Multi-Factor Authentication and the implementation of Government regulations such as PSD2 in the EU. Crucial elements of the Open Banking experience are Application Programming Interfaces (APIs). APIs enable  the efficient exchange of data between applications, services, and customers and can be safely used as long as security and access is properly secured. Acting as the backbone for Open Banking, applications built using APIs with correctly secured access allow backend communication between banks and financial institutions without the need to re-enter or re-share login details every time.

With regard to outdated security systems, investment will be crucial in addressing this issue. Reassuringly, 83% of all organizations surveyed do plan to invest more into Open Banking this year than the previous 12 months. This will not only allow them to update their security systems to meet the standards that Open Banking requires, but will also improve the customer experience and reassure potential users.

The foundations of Open Banking are rooted in providing consumers with choice of financial products and  how they control their finances. Therefore providing a service that is interoperable between brokers, banks and third party financial institutions can be used to better the customer experience, so that all parties are equipped with the information that they need is vital. Furthermore, investment into the deployment of modern authentication methods will be a key aspect of addressing consumer hesitancy due to security concerns and ensuring consumer buy in.

Communication will also play a crucial role, both internally and externally. As mentioned previously many concerns of both financial institutions and consumers are either already accounted for by security systems or have solutions that can be immediately implemented. It’s vital to ensure that education around Open Banking is improved to alleviate fears that in some cases are unfounded amongst businesses and consumers alike.

The role of the cybersecurity industry

Whilst there are clear concerns and issues amongst organizations across the globe, there is undeniably significant momentum behind the adoption of Open Banking.  With almost three quarters of organizations surveyed planning to introduce Open Banking in the next 18 months, cybersecurity professionals’ focus should be on ensuring this transition is as smooth as possible.

This momentum and clear intention from businesses to adopt and invest in Open Banking provides the cyber security sector with a significant opportunity to be at the forefront of this banking revolution. It will be vital for the industry to work closely alongside financial institutions to support this change and mitigate risk at every turn.

We can expect the adoption of Open Banking to continue in the short term, but its long term health and adoption is absolutely dependent on the ability of the industry to address the security concerns and hesitancy that exist.

There’s potential for Open Banking to have a revolutionary impact on the way businesses and consumers approach their finances and more and more institutions are set to incorporate it into their business. However, despite the clear benefits associated with Open Finance, this cannot be done at the expense of individuals’ security and protecting their personal and private data. This is why the cybersecurity sector plays such an important role. If the industry doesn’t effectively mitigate risk and alleviate fears, no matter how much enthusiasm and momentum there is behind Open Banking it will not realize its full potential.

The post Security and the Future of Open Finance: How to Improve Adoption Globally appeared first on Cybersecurity Insiders.

DIGISTOR®, a CRU Data Security Group (CDSG) brand, has added to its innovative line of secure DIGISTOR Citadel™ self-encrypting drives with pre-boot authentication by introducing PBA to its Citadel C Series lineup. The new drives, powered by Cigent®, add the critical PBA function to their existing DIGISTOR C Series of self-encrypting drives.

In addition, DIGISTOR is announcing that the Citadel C Series Advanced version has been listed by NIST as a FIPS 140-2 L2 certified storage device with NIST certificate #4294. This certification is an additional assurance that DIGISTOR C Series Advanced SEDs have been tested and validated by the US Government to meet its strict security requirements in the devices’ cryptographic module.

The renamed DIGISTOR Citadel C Series drives with PBA are ideal for developing secure Data at Rest (DAR) storage solutions in commercial and other government applications where protecting critical information against ransomware and other cyber threats is vital. Pre-boot authentication requires that a computer user provide trusted credentials to the drive before the laptop or desktop computer can detect and boot. This prevents unauthorized users from gaining access to the encrypted drive and its sensitive data.

“To safeguard data, robust cybersecurity features, like PBA, are needed in security-conscious industries like financial services, healthcare, and critical infrastructure such as power grids and water supplies, the defense sector, and government agencies,” said Randal Barber, CDSG President and CEO. “The Citadel C Series makes PBA affordable for the wide range of applications that do not demand the stringent certification requirements seen with some military and government customers.”

Citadel C Series drives offer additional cybersecurity functions such as multi-factor authentication (MFA), zero-trust file access, unreadable storage partitions protected by non-recoverable keys, automated threat response that renders data invisible if Cigent Data Defense is disabled, and secure access logs that capture all insider threat activity.

Citadel C Series SSDs are built on DIGISTOR TCG Opal or FIPS 140-2 L2/Common Criteria self-encrypting drives. The new drives will be available in Q4 2022 in standard M.2 NVMe and SATA form factors and 2.5-inch SATA form factors, for commonly used laptops, desktops, and tactical servers.

“DIGISTOR is an important partner who aligns closely with our vision and product offerings,” said Tom Ricoy, Chief Revenue Officer, of Cigent. “We are delighted to extend our collaboration and help the company broaden its important Citadel family of PBA self-encrypting storage solutions.”

These new drives with PBA are part of the extended Citadel family including the Citadel K Series SSDs, powered by CipherDrive™ and its CSfC-listed PBA (EE), which have been adopted widely with military and government agencies. The Citadel family rounds out the DIGISTOR secure SSD product line that includes FIPS-certified and TCG Opal-compliant SSDs, all of which are TAA-compliant, and are suitable for a wide range of security solutions.

For more information visit digistor.com/citadel.

ABOUT THE COMPANY

DIGISTOR, a CRU Data Security Group (CDSG) brand, provides secure storage solutions for Data at Rest. CDSG is a leading provider of data security solutions and data transport and storage devices for government and military agencies, small and medium-sized businesses, the entertainment industry, corporate IT departments, data centers and digital forensic investigators. Its other brands include CRU removable storage devices, ioSafe fireproof and waterproof data storage devices and WiebeTech digital investigation devices.

The post DIGISTOR® EXTENDS COMMERCIALLY PRICED SELF-ENCRYPTING DRIVE PRODUCTS WITH KEY PRE-BOOT AUTHENTICATION FEATURE TO SECURE DATA AT REST (DAR) appeared first on Cybersecurity Insiders.

You don’t have to look very far to find evidence of a rise in cybercrime. It seems we can’t go a month without some news of a large data-breach.

There’s no shortage of statistics either – and none of them make for easy reading. Here are just a few recent ones, announced in time for cyber security month:

Globally, 30,000 websites are hacked daily.

64% of companies worldwide have experienced at least one form of a cyber-attack.

There were 22 billion breached records in 2021

The latest Anti-Phishing Working Group (APWG) “Phishing Activity Trends Report” for the second quarter of 2022 found 1,097,811 observed phishing attacks, the most the group has ever measured in its history.

Dematerialization of identity

Set against this backdrop, there has also been a dematerialization of proving ones identity – which could further put consumer data at risk.

What do we mean by the dematerialization of identity? Think of various incidents where you must prove who you are. That could be providing your passport and social security number when starting with a new employer, presenting bank statements and proof of address when applying for a mortgage or loan, or even proving your vaccination status when travelling – just to name a few.

In most of these instances, having to provide these documents online is not just commonplace – it’s the norm.

Convenience causes risky behaviors

Digital means of proving identity are the way forward and provide a number of benefits; customer convenience and ease being one of them. However, if not done in a secure way – it could put the end-user’s data at risk.

We surveyed consumers from across Europe and discovered that many are engaging in risky behaviors when it comes to sharing their identity credentials.

While many see digital IDs as a convenient means of carrying and showing something that needs to be used frequently – only 27% have an official Digital ID. A far higher proportion of consumers rely on screenshots, digital photos or a scan of their physical ID or similar official document.

Even a sizeable majority of those who have official digital IDs admitted that they have these copies or scans on their phones. With malware attacks on consumer devices on the rise, important and incredibly sensitive information is at risk – leaving consumers open to fraud and identity theft.

The move towards EU ID Wallets / eIDAS2

We’ve discussed the move towards EU ID wallets and the countdown to eIDAS2 before, highlighting how it’ll impact the everyday lives of citizens, as well as highlighting what consumers want from a wallet.

One of the biggest drivers behind the EU commission, governments and authorities for eIDAS2 is for all citizens to have means of accessing a wallet that is both convenient and easy to use, as well as secure.

In fact, the security credentials of EU ID wallets came to the forefront again this summer when a MEP called for the wallet to follow security by design principles. The draft regulation put forward stated that “it shall be technologically impossible to receive any information on the use of the Wallet or its attributes”.

In addition, personal data should only be stored and processed in the territory of the European Union, where Union and national law apply; such as GDPR. Other stipulations state that user consent needs to be explicitly given in order to store information from the wallet in the cloud.

The shift to sovereign cloud

To accompany digital ID wallet initiatives and the unrelenting shift towards the digitalization of credentials and personal data, many governments around the world are seriously looking at sovereign cloud.

A sovereign cloud ensures digital and data sovereignty. It is a means to maintain physical and digital control over strategic assets, including data, algorithms, and critical software. It helps ensure that data remains free from external jurisdiction control and provides the right protection from foreign legislatively enforced access.

At Thales, we believe digital ID wallet ecosystems are the future of digital identity. They will enable smooth and trusted proof of ID and entitlement anywhere anytime while enabling data privacy to move to the next level by offering the most convenient user experience and compliance with the most stringent security and data privacy requirements.

For further reading, please check out the below:

The post Digital ID : The Cyber Security Imperative appeared first on Cybersecurity Insiders.

By Gal Helemski, Co-Founder and CTO, PlainID

As the world continues to enter into virtual spaces, the use of identity and access management, or IAM, is ultimately a requirement for participating organizations. In particular, the need for smart technology that manages who can access what and when is at high demand within the healthcare industry.

Many healthcare organizations are using their IAM systems to address their ongoing complex compliance requirements, combat persistent cybersecurity threats, and securely share medical records with patients and within the healthcare network. This balancing act often leaves healthcare providers with a series of obstacles during critical circumstances.

While these obstacles aren’t new to healthcare organizations, it doesn’t mean that the IAM systems in place are equipped to solve each issue. A few factors that test the functionality and efficiency of these systems are:

Compliance Complexities and Digital Data

Complexities within the compliance landscape continue to change course due to code updates resulting in new requirements. Healthcare-specific compliance frameworks like HIPAA require healthcare organizations to manage digital data so that it aligns with the newer data privacy laws, like the EU’s General Data Protection Regulation (GDPR) and the California Privacy Rights Act (CPRA). Increasing complexities regarding how medical information and data is applied have placed additional responsibilities on healthcare providers to respond with efficiency.

Consumer Expectations

Consumers expect information regarding their health to be delivered with a certain level of sensitivity and transparency. Privacy concerns can be expected in relation to health data, but consumers are also looking to be handled with the same special care that exists between a healthcare provider and patient. The need for open communication about personal health information is why Gartner recommends healthcare organizations develop “strategies for notification, communication and minimizing the amount of data collected and retained.”

Data’s Lifetime Impact

The impact of valuable data isn’t lost on healthcare organizations, but the challenge they face is how to use data for future use. While leaders in the healthcare space recognize the significance of data as a critical resource, stakeholders can run into issues in accessing and adequately leveraging it. Creating an intentional use for data over a period of time can be challenging due to the difficulty of sharing data securely and efficiently. This is especially true when it comes to sharing patient medical information.

Security Threats

As part of the digital landscape, the healthcare industry isn’t foreign to cyberattacks, especially those caused by ineffective data management and access controls. Health facilities are frequently using massive databases to accommodate health providers and patients. As facilities continue to exchange these databases, there is a growing need for data access controls to provide intuitive authentication methods to give the right personnel access to the right information.

Ultimately, policy-based access control (PBAC) can provide healthcare organizations with the proper solutions to address these issues. Using a dynamic and policy-based access control system creates an environment for healthcare organizations to address each factor from a more holistic perspective.

A holistic approach enables the type of scalable functionality needed for modern healthcare organizations to build success. Policy-based access control streamlines access control for healthcare data, making it easier for healthcare providers to align technical controls with business requirements.

By delivering dynamic authorizations that are controlled by a centralized PBAC, healthcare organizations can establish a solution that delegates governance, management and enforcement of the right controls at the right time. More specifically, through granular access control policies, healthcare providers can share medical information to individual patients while providing the same information with their organization based on certification level.

Overall, the obstacles healthcare organizations and their providers face to deliver effective care will persist. Confusing compliance mandates, proper data research and security threats will always remain, along with the demand for healthcare to become more accessible and digital-friendly. But there are ways to address the fine-grained needs of healthcare organizations while maintaining the necessary security and risk requirements.

While many healthcare organizations using identity and access management systems seem to be a step ahead, they may not be positioned to share vital information across their network. Leading with policy-based access control technology is the best way for the healthcare industry to manage data in the most efficient and secure way. The power of using dynamic authorization enables decision-makers to set meaningful and efficient access controls policies.

The post Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control appeared first on Cybersecurity Insiders.

ACS Technologies (ACST), a leading provider of church management software and services in the United States, has announced its integration of the Curity Identity Server across its client-facing products.

The integration of the Curity Identity Server to ACST is driven by a desire to provide high-level security to end-users, with Curity enabling seamless identity and access management (IAM) and log-in and providing a number of different multi-factor authentication (MFA) flows to fit business needs. Previously, ACST relied on a home-grown solution that is currently being phased out and replaced by a cloud-native deployment of the Curity Identity Server in AWS.

By utilising the Curity Identity Server, ACST will be able to concentrate on its product development instead of spending time and resources building IAM and MFA infrastructure in-house. The integration of and investment in Curity’s easy-to-use, low-cost product demonstrates ACST’s commitment to end-user security and its dedication to continually improving its product for end-users.

On choosing Curity, Robert Gettys, Chief Product and Technology Officer at ACS Technologies, says, “We wanted to invest in the right security to help us allocate time to meeting the unique needs of churches across the country. Thanks to the excellent capabilities of the Curity Identity Server, we’ll be able to concentrate on developing our core products to serve our ministry partners rather than attempting to build IAM and MFA ourselves. With Curity’s support, we’ll enhance our customer offering and be better positioned than ever to build the Kingdom.”

Curity’s CEO, Travis Spencer, comments, “We’re really excited to be working with ACS Technologies. I’m confident that our product’s extensive features and standards-based approach will enable ACST to achieve their goal of stepping up security for end-users while maintaining ease of use.”

The partnership launched earlier this year will be rolled out across its products and services.

About Curity

Curity is a leading supplier of API-driven identity management, providing unified security for digital services. Curity Identity Server is used for logging in and securing millions of users’ access to web and mobile applications as well as APIs and microservices. Curity Identity Server is built upon open standards and designed for development and operations. We enjoy the trust of large organizations in financial services, telecom, retail, energy, and government services who have chosen Curity for their enterprise-grade API security needs. Visit https://curity.io/.

The post ACS Technologies selects Curity to provide seamless authentication across its end-user products appeared first on Cybersecurity Insiders.

Smart meters have grown in popularity over recent years. In an environment where climate change and sustainability have never been higher on the agenda, smart meters allow individuals and organisations alike to get a better sense of energy consumption. The data and insights they generate allow end-users to make more informed decisions about their own energy consumption (something that has become vital among the current cost of living crisis). In addition, it can help utilities and smart grid managers better make data driven decisions about energy demand, best energy mix and when to scale services.

The EU aims to guarantee accessible, affordable, secure and sustainable energy for all Europeans and to be climate neutral by 2050. A large roll out of smart meters is part of that drive, with the European Commission predicting that 266 million smart meters will be installed by 2030.

That said, while the benefits of smart meters are evident and numerous, they also pose a serious cyber security threat.

In this blog we’ll be looking at what utilities and smart meter vendors alike can do to secure the industry from risk.

Cybersecurity risks

As with any connected technology, despite carrying huge benefits, they also pose opportunities for hackers.

If we look at the individual consumer implications of a hacked smart meter – hackers could get access to private consumption data and household habits, as well as other devices connected to the same network. Beyond data privacy breaches, hackers can also manipulate data and readings – causing consumers to make decisions against their best interests. Not only this, but consumers will also lose trust in the technology which could ultimately build up a resistance to smart meter deployments.

There’s also the wider scale risk of the smart meter grid becoming compromised. If a hacker were able to override individual meters so they appear to increase demand simultaneously, they could bring down an entire grid, and create large-scale power outages. As cities become increasingly connected, a compromised grid could impact many other applications like smart lights, traffic systems etc.

Challenges of securing the smart grid

It’s clearly an imperative that the smart grid, and smart meters are secured, but there are several challenges and obstacles in play:

  • Evolving threat landscape Cyber threats are constantly evolving, adapting and getting more sophisticated – it’s never safe to assume that anything is secure. Being able to keep up with and mitigate against these threats requires dedicated cybersecurity expertise.
  • Regulation is vital for enforcing a set of standards within an industry. There are currently multiple cybersecurity initiatives in Europe which bring with them a level of confusion. The need for harmonisation is important – organisations, such as ESMIG, help to create unity through the collaboration of multi players in one room to discuss and move things collectively.
  • Challenges of retrofitting If security hasn’t been built in from the start it can be hard to solve any security flaws in hindsight. You can always use analytics to see there is something wrong, but you´ll have a hard time solving the issues if security elements have not been integrated at the core of the system.
  • Multiple attack vectors There’s a lot of potential attack vectors that need to be secured; the connected meter, the source of the data going to grid managers, the transfer of data itself and who has access to the data.

How to protect the smart meter infrastructure:

As identified above, there are a lot of hurdles to securing smart meter infrastructure – requiring a holistic approach to cybersecurity. That said, there are some fundamental principles that need to be followed:

  • Proceed to an automatic risk or threat assessment at the beginning of a project to meet regulation and specific context
  • Establish a trusted source of data by implementing strong trusted IDs in the core of connected meters
  • The data sent from smart meters should be encrypted to ensure confidentiality
  • The exchange of data should be done between trusted entities. This is possible through digital mutual authentication
  • A strong lifecycle management process should be implemented, assets and credentials should always be updated via secure, remote updates using digital signatures

Only systems that have been built from the ground up with strong security will be robust enough to withstand the growing cyber threats and implement the above best practice. The importance of security by design cannot be underestimated here.

It’s vital that utilities and Distribution System Operator (DSOs) must require this from their suppliers. There’s a tremendous amount of responsibility that they have here in the future of smart meter development, to protect critical infrastructure, as well as their own revenues and reputation.

In turn smart meter vendors need to work with a cyber-security provider to help design their security from the outset.

Watch our video on Securing the Advanced Metering Infrastructure here:

The post Securing the Smart Meter appeared first on Cybersecurity Insiders.

In my previous blog posts I took you through the last 30 years of digital banking security and how it has evolved to what we know and use today. In my cliff hanger I mentioned FIDO and passkeys and how they will change the landscape – it’s time to dig deeper and discover how this technology will mark a new era for Strong Customer Authentication (SCA).

FIDO Alliance

FIDO Alliance - Simpler stronger
Source: FIDO Alliance, https://www.slideshare.net/LoriGlavin2/fido-masterclass

In 2013 FIDO Alliance was founded as an open industry organisation with a very focused mission: to build authentication standards to help reduce the world’s over-reliance on passwords. To do so, FIDO Alliance has released a set of new specifications and protocols for SCA based on the combination of biometrics as the first factor, and possession as the second factor. In short, no knowledge factor and no passwords.

FIDO Strong Customer Authentication

What FIDO Alliance does, for a given user and service, is generate an authenticator consisting on a cryptographic key pair, on-board a FIDO enabled device; the private key, remains on the device , while the other key is sent to the service provider’s FIDO Authentication Server. Once an authenticator has been generated and registered, it can be used to securely authenticate the user on that device. The user will then present biometrics that are checked locally on the device and upon successful validation of biometrics, it will trigger the cryptographic exchange between the device and the authentication server to validate the device.

FIDO Alliance - Authenticator
Source: FIDO Alliance, https://www.slideshare.net/LoriGlavin2/fido-masterclass

FIDO native support on devices

FIDO Alliance - Companies
Source: FIDO Alliance, https://www.slideshare.net/LoriGlavin2/the-state-of-strong-authentication

An impressive list of companies have joined FIDO Alliance over time, including chip makers, computer and smartphone manufacturers, payment schemes and banks. But, most importantly, Microsoft, Apple and Google all joined and pledged to support FIDO at OS level on Windows, Mac OS, Android and iOS. That pretty much grants native FIDO support to all laptops, PC computers, tablets and smartphones.

With that level of ubiquity and underlying “plumbing”, FIDO have big chances to succeed in becoming the next mainstream SCA technology. As of January 2022, according to FIDO Alliance, more than 4 billion commercial devices with native support for FIDO, were already deployed worldwide. That is a big deal as OATH has been the dominant standard for strong customer authentication for 30 years, and we never enjoyed native support for it on PCs, laptops or phones.

What is WebAuthn?

FIDO Alliance have gone one step further – they reached out to W3C, the standards body for all things internet, and worked together to define a new standard API, published by W3C under the name of WebAuthn. As its name hints, the purpose of WebAuthn is to enable any web service to call the OS of the device where it is running to request FIDO based authentication. Never before has it been possible for web services to directly integrate strong customer authentication – the best we could do was initiate an out-of -band push from the web service to a mobile app in the user´s smartphone, where we could have SCA implemented via an SDK. Now, with WebAuthn, a user with a FIDO enabled laptop and a WebAuthn enabled browser, can register, store and use a FIDO authenticator for that service on that device, with a user experience as sleek as simply presenting biometrics on the device. WebAuthn was published by W3C in 2018 and is today supported by all major web browsers, including Microsoft Edge, Google Chrome, Apple Safari and Mozilla Firefox.

FIDO is everywhere

So, in summary, as of January 2022, current OS versions used by every single smartphone, tablet, PC and laptop are already FIDO enabled – and every major browser is also ready to use FIDO thanks to WebAuthn.

FIDO Alliance - Native Support
Source: FIDO Alliance, https://www.slideshare.net/LoriGlavin2/fido-masterclass

Now, if only service providers and end users would know about it …

The future is passkeys

FIDO Alliance - Press release
Source: FIDO Alliance, https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/

On May 5, 2022, Apple, Google and Microsoft issued a joint PR what appears to be a first, and the only joint PR I can find on record. This PR, in essence, is a very strong pledge to kill passwords.

The first paragraph sums it all up:

“In a joint effort to make the web more secure and usable for all, Apple, Google, and Microsoft today announced plans to expand support for a common passwordless sign-in standard created by the FIDO Alliance and the World Wide Web Consortium. The new capability will allow websites and apps to offer consistent, secure, and easy passwordless sign-ins to consumers across devices and platforms”

They also gave a name to the technology for end users to refer to moving forward, “passkeys”.

The media impact of the announcement was immediate, with lots of articles and commentaries. In the weeks that followed, Google & Apple unveiled their specific plans for passkeys during their annual developer’s conferences: Google I/O and Apple WWDC. Apple announced that passkeys would be deployed commercially on iOS 16 and Mac OS Ventura, set for release after the summer. Google and Microsoft also deployed resources for developers that enable them to start building passkeys to support web services.

What can we expect next for authentication?

So we have a name, we have documentation for developers to do the work and we have all the OS and browser support we need. Now it’s just a matter of time before we begin to see services supporting passkeys more and more. Users are going to love it. Service providers, including financial institutions are going to love it… There is not a single cloud in the sky… or?

In my next blog post, I will look in detail at passkeys, how they differ from FIDO Authenticators as we knew them, their unique benefits, and the unique concerns they raise to some FIs.

I will also speak on this topic at the FIDO authenticate conference in Seattle on October 18.

For further reading, visit:

The post The Evolution of Digital Banking Authentication – Part 3 – FIDO and Passkeys will rock the digital world appeared first on Cybersecurity Insiders.

When we discuss the importance of identity, it’s usually in relation to advancements in digital identity. Whether it’s biometric passports, Foundational ID, Border control or travel facilitation solutions, or ID wallets – the focus of a lot of thought leadership within the industry usually centres on the tech innovations that enable us to prove our identity instantaneously, seamlessly and securely.

While these developments are important and (rightly) get a lot of attention – in this blog we’ll be highlighting the wider issue of identity as a basic human right.

Identity as a human right

Every year on the 16th September we recognise International ID Day. It’s an important and symbolic day in the fight for everyone to have a legal identity; the date is chosen in recognition of the UN’s Sustainable Development Goal 16.9 which calls for the provision of legal identity for all by 2030, including birth registration.

According to the World Bank, more than 1 billion people in the world today do not have the legal means to prove their own identity. Just take a step back and consider that fact. In 2022, one seventh of the world’s population cannot prove who they are – and the implications are far reaching. Not having the legal means to prove one’s identity means not only are you unable to vote or access education, you cannot benefit from state services or social safety net programs set up to help poor and vulnerable households with cash, social pensions, school feeding programs and more.

In short, those who don’t have a legal identity are effectively excluded from the development of the political and economic life within their own countries – with tech advancements only making this inclusion gap or ‘digital divide’ wider.

We’ve highlighted this issue before, most recently for Earth Day – and given today marks International ID Day, it seems appropriate to shine the spotlight again, and the work being done – specifically the ID4Africa movement.

ID4Africa

Founded in 2014 by Dr. Joseph Atick, ID4Africa is driven by the need to establish identity-for-all, not just as a legal right, but also as a practical necessity to enable inclusive access to services in Africa. The event, which takes place every year in a different African country, sees African governments come together alongside solution providers to discuss and explore how digital identity and aligned services can advance socio-economic development within their countries.

In 2022, there is a renewed sense of purpose and energy since the conference in 2019 – with the Covid-19 pandemic further highlighting the importance of this mission, with this sentiment perfectly expressed by Dr. Joseph Atick, executive chair of ID4Africa:

“Our end goal in ID [for development] is not about digital identity, it is about building public infrastructure for governance and service delivery as frictionless, robust and respectful of people’s rights and liberties – including the right to have legal identity.”

At Thales, we’re a proud sponsor and contributor of this important movement, and back in June we took part in the ID4Africa conference in Marrakech.

We believe that identity management solutions can no longer rely uniquely upon the issuing of physical ID cards, but instead will focus also on biometrics such as face, fingerprint, or iris. The establishment of biometric identity, designed with data privacy and compliance at its core, will not only increase efficiency in the long term, but will reduce the chance of fraud; in short, it’s the most trusted way to automate the steps involved in the identity registration process. As my colleague Charlotte Chateau (Manager at Thales Identity & Biometric Solutions) put it perfectly in her speech during the event: “biometrics is a prerequisite to establish a unique identity, a unique legal identity.”

The whole session can be found here, with Charlotte’s   contribution from 42 minutes in.

While the work of governments and solutions providers alike is not just limited to one day, there are various initiatives taking place to highlight this cause: https://www.id-day.org/

The post International ID Day: Shining a spotlight on legal identity appeared first on Cybersecurity Insiders.

The issue of climate change is one of the most pressing facing us all – with the spotlight firmly on government, big businesses, and industries alike – with the travel industry one of those industries consistently called into question.

A lot of this conversation tends to center around aircraft emissions – and while this is no doubt an important issue, there’s a wider drive for sustainability and energy efficient solutions across the whole travel sector.

European Sustainable Development Week

This week it’s European Sustainable Development Week – an initiative to facilitate the organization of activities that promote sustainable development and make these efforts visible on a common platform. As such we wanted to take this opportunity to shine a spotlight on sustainability drives that might not get a much attention, specifically the airport sector.

The sector has set itself some very ambitious and strict net-zero deadlines. A prime example of this is ACI Europe, the body that represents European airports, is committed to achieving carbon net zero by 2050. In addition, nearly half of Europe’s airports have set themselves target dates of 2030 or earlier. This race to net-zero energy also coincides with the ever-pressing need to reduce energy spending.

As such, the airport sector is scrutinizing every aspect of the passenger terminal infrastructure –  with automated document readers a prime example of this.

Making Automated ID Energy Efficient

Automated ID readers have become commonplace in airports today – and have become increasingly sophisticated. Even first time and infrequent passengers can scan their own passports and travel documents in a matter of seconds. As a result, perhaps the most notable use of document readers in airports is at the heart of automated, self-service passenger gates and kiosks. High levels of customers satisfaction, shorter queues, less staff intervention plus high levels of security are just some of the benefits associated automated ID.

Usually, speed and reliability are the number one factors for airport operators when selecting a document reader – but now energy efficiency and carbon footprint also must be front and center.

Given the high volume of passenger throughputs, even marginal savings in the energy needed to scan each travel document could deliver significant reductions in overall carbon emissions. The operating profile of document scanners can also play a huge part; while they typically need to be available 24-7, during quieter periods there could be lengthy downtime between passengers where less energy is required.

We recognize how important it is for the sector to respond – and as such at Thales we’re proud to have achieved the world’s first Energy Star certification for a document reader, the Thales AT10K.

What is the Energy Star Label?

Established in 1992, the Energy Star label is an important accreditation for businesses and consumers seeking to reduce their carbon footprint. Backed by the US government’s Environmental Protection Agency (EPA), the scheme provides an independent and authoritative means of identifying products that can demonstrate high standards of energy efficiency.

Our document reader, is designed to inspect and image travel documents, including electronic travel documents and 1D and 2D barcodes used by the airline industry on boarding passes and cell phones. The reader’s low profile and simple shape make it ideal for integration with self-service airport kiosks and automated passport control gates.

Certification was achieved via design enhancements that include introducing standby modes to minimize power consumption when the scanner is not in use. Compared to previous generations of the product, overall power consumption has been reduced by 28%.

Every Effort Counts

In the race against climate change and meeting net-zero targets, there is no one size fits all solution, nor one silver bullet. Instead it requires every sector to look at its operations, piece by piece and re-evaluate how they can improve and make more energy efficient.

Thanks to technology, this drive towards lower carbon emissions also will have financial benefit, as well as improving standards and the customer experience.

Awareness weeks like ESDW are important as they highlight these important developments that sometimes go under the radar – in the race to reach net-zero, the more knowledge sharing across industries and sectors is vital.

Further reading:

The post European Sustainable Development Week: Shining a Spotlight on Energy Efficient ID Verification and Document Readers appeared first on Cybersecurity Insiders.

2009 was the year that changed banking forever. It was the year we saw Apple launch the iPhone and in no time, feature phones were a thing of the past. Smartphones were everywhere, bringing with them mobile apps which went on to pave the way for the digital banking revolution that we know and use today.

In my last blog we delved into the evolution of remote financial services, exploring the steps that led us up to this point in 2009. But even since then, in just 13 years, the digital banking landscape has evolved even further, and continues to do so. So how did the smartphone era impact digital banking?

The rise of soft-tokens

The first use case from the banking industry, among others, of mobile apps brought us “soft-tokens”. Soft-tokens were the software version of a hardware OTP token turned into a mobile app. The user would still access the banking server through a PC or laptop presenting password as a first authentication factor. But now they would open a dedicated “authenticator” app, issued by the bank (or a bank´s trusted 3rd party) to get an OTP on their smartphone. Switching from a tamperproof offline device to a software token generator running on a multipurpose, and very much online device was, again, a major concession of security in the name of better UX whilst lowering costs. The innovation was received reluctantly… yet quickly embraced by more and more banks. The phone, whether through apps or through SMS OTP, became mainstream as a possession authenticator during the 2010’s.

But smartphones had an even bigger impact than that. They became not just an authenticator, but a channel. Banks started to replicate their digital web services in the form of mobile apps. Mobile banking (m-banking) was born as an alternative to internet banking (e-banking) and users were fast to embrace both the UX offered through apps and above all the “anytime, anywhere” access to digital banking services.

Integration of Software Development Kits

Mobile in-band strong customer authentication

Mobile banking apps also needed to be protected with SCA, and so they started to incorporate OTP generation capabilities, often by integrating Software Development Kits (SDKs) from security specialists like, Thales. These SDKs evolved to implement many software security features to protect the sensible OTP generation process, and even add over

all protection to the m-banking app – so, overtime, security of the apps improved.

But the improvement on UX was even higher. The mobile app could now generate an OTP and send it silently to the authentication backend to validate the possession factor, in real time and transparently to the end user.

Biometrics become mainstream

Mobile in-band strong customer authentication with biometrics

In 2013 Apple launched Touch ID on the iPhone 5S, and in 2017, Face ID on the iPhone X. The smartphone industry quickly followed suit, and along the second half of the 2010’s, biometrics became mainstream on mobile devices. For mobile banking, biometrics quickly came to replace knowledge as the “first” authentication factor of choice for end users – a solution fully compliant with the most demanding banking regulations, such as PSD2 in Europe.

Out of band

Out of band strong customer authentication

The security, and especially the UX, offered by mobile banking apps got so good, that banks wanted to leverage them to offer better access experience through all other channels available to their users. Mainly, of course, e-banking via PC/laptop, but also other channels such as voice calls or even ATM. For example, to start e-banking on a PC/laptop, where biometric support adoption was not as fast as on mobile, in 2020 a user is still asked to enter username and password. But thanks to out of band, there is no need to type an OTP anymore. Instead, when the user clicks enter, the banking server will trigger a push notification to wake up the bank’s mobile app on the user´s smartphone. The user will open the app and the app will silently generate an OTP and will send it to the backend as proof of possession. “Out of Band” (OOB) refers to the fact that the authenticator is a different device than the one used to access the service. This on itself brings in enhanced security. As for the UX, the OOB implies more friction than what we achieve for m-banking, but it is significantly better than having to type in an OTP.

Banking today

In band out of band SCA comparison

This long journey has brought us to where we stand today. We have started the 2020’s with all the different legacy authentication methods mentioned above still in use by banks all over the world. But the state of the art SCA in banking at the start of the 2020s can be summarised as:

  • Biometrics + in band mobile app OTP for m-banking
  • Password + OOB mobile app OTP for e-banking and any other channel

Technology advances have allowed us to greatly improve both UX and security over time. Not always in a straight line. For over a decade we faced a compromise between security and UX, and FIs had to accept degrading one in order to improve the other. But with the arrival of smartphones we have been able to leverage the connectivity and power of these devices to improve both UX and security to where we stand today.

The future of banking

While FIs were implementing all these changes on their banking services, and users were being exposed to them, something else has been going on behind the scenes over the last 8 years. Something that was revealed to the grand public in the summer of 2022, but that will change the way we access digital services over the next decade.

We are indeed on the brink of a major paradigm shift for authentication to digital services.

The arrival of FIDO Passkeys

Evolution of strong customer authentication

Experience from the past tells us that the arrival of FIDO Passkeys is likely to drive financial institutions to address end user demand for an even better UX, as well as associated legitimate security and service continuity concerns.

This October (18th), I will speak at the FIDO authenticate conference in Seattle about the evolution of security and UX in financial services – along with the technology solutions that have helped this to grow.

Stay tuned for my next blog post where we will look at what FIDO, WebAuthn and Passkeys are, and what impact they will have on digital banking services in the coming years.

For further reading, visit:

The post The Evolution of Digital Banking Authentication – Part 2 – The Digital Banking Revolution appeared first on Cybersecurity Insiders.