Dating Strategy or Malware Technique?
When the Bill Comes Due: Securing Challenger Banks’ Growth
Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms
Strong Customer Authentication: The Potential and Peril of Biometric Authentication
PSD2 and Two-factor Authentication: A Double Security Challenge
The Bernoulli Principle: Epidemiological Models for Identity
Living Like the 3%: A Secure User Experience on Financial Applications
A Cher-based Lament for Lost Data
Last Minute Romantic Ideas for the Security-Minded
I Am Spartacus: Privacy through Obfuscation and the Right to be Forgotten