Security Startups: Innovative Approaches to Detection
- Date:October 25, 2019
- Author(s):
- Sean Sposito
- Report Details: 11 pages, 5 graphics
- Research Topic(s):
- Cybersecurity
- PAID CONTENT
Overview
For financial institutions (FIs) and payments companies, identifying cybersecurity startups to partner with can be among the most challenging tasks inherent in network defense. Unlike large established vendors, smaller, younger firms have the agility required to build new products and services that rapidly meet changing technology risks.
However, they are generally niche players who focus on one specific industry problem and may not be able to meet the rigorous operational bars banks require. Instead of focusing on the size and the tenure of these innovative startups, FIs should consider focusing on an early-stage vendor's background, funding partners, and their approach to solving an FI's problem to understand the efficacy of that firm’s solution.
Key questions discussed in this report:
- What are the current adoption rates of contactless cards in the United States?
- How do consumers view contactless cards?
- Why should issuers and merchants adopt contactless cards?
- What are the risks of not adopting contactless cards?
Companies Mentioned: GreyNoise, Prevailion, Spycloud
Methodology
The consumer data in this report was primarily collected from the following:
- A random-sample survey of 3,000 respondents conducted online in March 2019. Respondents are selected to be demographically representative of the U.S. population over the age of 18. The overall margin of error is +/-2% at the 95% confidence level for questions answered by all respondents.
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world