The core difference between STO and ICO for projects and investors

Security tokens, in fact, can be equated to securities. They can give their owners, for example, ownership that is accordingly regulated. So in the US, the SEC resolved that security tokens are knuckle under to the same federal laws as standard securities. This type of token can be backed by company assets, such as stocks, the right to receive dividends or the right to vote. And undoubtedly for investors who believe in a company, this …

Digital first in banking: Going beyond the interface

Think of the changes in the past ten years in terms of how we deal with our banking needs. We moved from telephone banking to online or internet banking. The iPhone became more popular and apps got better and more secure. It is hard to remember how we managed with the rudimentary tools of ten years ago; so turn on your imagination and wonder what banking will be like ten years from now. How should …

Digital Banking – A Comparison of U.S. and European Strategies

Some strategies for digital banking are common globally. Other strategies can be differing with both attacking the same problem, but using a different solution. As well, some problems are specific to a region (Europe or U.S. for example) and need to be addressed with a different method than would be used in another region. We are going to look into these digital banking strategies to analyze which fall under each of these three category types and why.

What CEOs Need to Know About the Future of Cybersecurity

Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information and cyber security risk. However, not all of them understood how to respond to those risks and the implications for their organizations. A thorough understanding of what happened, and why it is necessary to properly understand and respond to underlying risks, is needed by the CEO, as well as all members of an organization’s BoD, in today’s global business climate. …

What the hell is a blockchain phone—and do I need one?

All of a sudden, several crypto-focused handsets are hitting the market, or will soon. The biggest player in the new game is Samsung, which confirmed this month that the Galaxy S10 will include a secure storage system for cryptocurrency private keys. It joins HTC, which for months has been touting the Exodus 1; Sirin Labs, which used proceeds from a huge ICOto build the Finney; and Electroneum, which this week began selling an$80 Android phone that …

Mobile Finance; What does the Future Hold for the Banking App?

Mobile Finance apps have become more and more popular, not only can you check your balance, pay bills and make transfers – it’s amazing how simple it is to make a payment these days compared to traditional banking days. I can’t actually remember the last time I deposited a personal cheque. Looking at a survey carried out by Think with Google and Ipsos, on average, out of the people that responded, users had two finance …

The Ultimate Guide to Cybersecurity

Cybersecurity is a very intimidating topic, much like cryptocurrency and artificial intelligence. It can be hard to understand, and, frankly, it sounds kind of ominous and complicated. But fear not. We’re here to break this topic down into digestible pieces that you can rebuild into your own cybersecurity strategy. Bookmark this post to keep this handy glossary at your fingertips. Here’s a comprehensive list of general cybersecurity terms you should know.

Blockchain: Separating the fact and fiction

When it comes to the business of law and the technology that law firms rely on to operate, blockchain has until very recently been of limited relevance, with CIOs and their teams only interested at the very fringes – the majority will tell you off the bat that blockchain is massively overhyped, and to a great extent they are right. But in contrast with the fact that blockchain in 2018 officially entered the trough of …

The Future Now with Artificial Intelligence

Looking forward to 2019 as exciting as it can get for technology, in particular for the broader umbrella of Artificial Intelligence, with chips getting faster and cheaper than ever, and the remotest places and people getting connected to the internet. While anyone would be hardly oblivious to the term AI unless one is absolutely living in a den, we have been consuming the outcomes of AI through many applications and systems we use on a …

Why the culture of cybersecurity is broken–and how to fix it

The big problem in security isn’t people, process, or technology. While imperfect, the industry is filled with hardworking and talented people, security awareness and processes are improving rapidly in most organizations, and there is no shortage of good technology. The big problem is cultural, and it is at the root of all these other shortcomings.

Digital Transformation: An Opportunity for Retail Banks to Overcome Challenges in the Digital Age

The digital transformation wave has completely upended the banking business with game-changer technologies like web, mobile and most recently, Artificial Intelligence. Over 1billion transactions are conducted through mobile and internet banking with 2359 high-street branches closed in last two decades. Mobile apps are winning the race with 15000 people downloading a banking app per day.

Why digital strategies fail

The importance of B2B digitization, and its competitive implications, is easy to overlook because the digital shifts under way are less immediately obvious than those in B2C sectors and value chains. <<one year later and still fresh>>

Blockchain’s Occam problem

There is a clear sense that blockchain is a potential game-changer. However, there are also emerging doubts. A particular concern, given the amount of money and time spent, is that little of substance has been achieved. Of the many use cases, a large number are still at the idea stage, while others are in development but with no output.

Trust and Digital Identification in an Open Banking World

Identity has traditionally been verified through the physical provision of documentation that confirms a person or a business. Historically, the acquisition of goods or services required face-to-face interaction and, therefore, the presentation of verification documentation did not create a significant burden. The evolution of digital channels has resulted in increased remote availability of goods and services, but the corresponding identity verification process has largely been left behind.