top of page

BLOG
Search


Quantum Resistant Encryption
The performance gains in quantum computing are so significant that Shor's algorithm will break our current encryption methods.
Organizations worldwide face two challenges
"Harvest now and encrypt later."
" Trust now, forget later."
May 122 min read
Â
Â
Â


How Temenos Financial Crime Mitigation Helps Prevent Fraud and Meet Compliance Rules
Today, every financial institution relies on solutions designed to combat financial crime. Financial Crime Mitigation (FCM) platforms enable banks to prevent regulatory fines, detect fraud, and safeguard their reputation, while also enhancing operational efficiency and reducing operational costs. These solutions support the risk-based approach that modern banks follow when managing compliance and financial crime.
May 72 min read
Â
Â
Â


Security for Your IRIS T24 Applications
The performance of your core banking system is essential to ensure high-quality service for your customers. More importantly, however, is ensuring that all their information and account access remain fully secure.
Since one of the primary ways to expose your T24 banking services is via APIs, this section covers the key security mechanisms Temenos provides for your IRIS APIs.
Jan 152 min read
Â
Â
Â


System Engineering Automated Testing in T24
Learn how SEAT automates testing in T24 covering script creation, execution, result validation, and error tracking.
Dec 18, 20253 min read
Â
Â
Â


The True Cost of a Data Breach
The 2025 IBM Cost of a Data Breach Report reveals significant shifts in the cybersecurity landscape. While global breach costs have decreased by 9%, averaging $4.44 million, the United States saw a 9% increase, driven largely by regulatory and detection expenses.
Nov 27, 20255 min read
Â
Â
Â


Security Testing
Security testing prevents breaches, protects user data, and builds trust by catching vulnerabilities before attackers do.
Oct 2, 20252 min read
Â
Â
Â


One Tuning to improve Performance and Security
We all appreciate fast and secure systems, but increased security does not necessarily improve performance continuously. One prominent example is multi-factor authentication. This extra step is protecting users from password-related attacks, but at the same time, it creates more friction and increases the duration of the login procedure.
Sep 4, 20252 min read
Â
Â
Â


$625 Million Loss in Crypto due to Performance Issues
Sacrificing Security to improve performance is a dangerous game. Ronin Network learned a bitter lesson by reducing the validator nodes to 9 and failed to discover that adversaries controlled the majority, allowing them to approve their fraudulent transactions.
Aug 14, 20252 min read
Â
Â
Â


Security Management in T24 Core Banking
T24 Security Management controls user access, permissions, and session settings to enhance security and optimize system performance.
Jun 12, 20253 min read
Â
Â
Â


Systems often fail because their designers protect the wrong things or the right things in the wrong way
Systems often fail because their designers protect the wrong things or the right things in the wrong way.
Mar 6, 20252 min read
Â
Â
Â


Bring Vulnerabilities in Context
Traditional application security tools support early development stages, but how do we identify and mitigate the risks involved at Runtime?
Feb 27, 20253 min read
Â
Â
Â


Secure by Design
The fundamental challenge in the software industry is a knowledge gap about what "secure" means, how claims should be validated.
Jan 16, 20252 min read
Â
Â
Â


Cybersecurity Risks in AI and Machine Learning
AI and ML bring incredible benefits, but also introduce new cybersecurity risks. Explore how to stay secure against these threats.
Dec 5, 20242 min read
Â
Â
Â


Balancing Aesthetics, Performance, and Security: The Value of Beautiful Applications
What is the value of beautiful applications developed with performance and security in mind, and why do we often realize far too late...
Nov 9, 20233 min read
Â
Â
Â


5 Steps to implement ActiveDirectory Authentication in T24 Transact Core Banking
In a T24 Core Banking system, you can manage access and permissions in the local database or use external systems such as LDAP or ActiveDirectory. From a security perspective, using your existing identity and permission management system for your Core Banking system has several benefits, such as: You enforce existing password policies You avoid users having to remember one more password Your existing permission management team is in charge User onboarding becomes much easier
Aug 31, 20232 min read
Â
Â
Â


How can you Streamline your Banking Workflows with Advanced Security?
Cyber security is crucial when protecting our essential goods, such as personal or financial data. A significant proportion of 61% of security breaches involve credentials, and the average data breach cost is 4.2 million us dollars.
Aug 24, 20232 min read
Â
Â
Â


How we've identified Cyber Attacks while checking the Health of our Applications.
Performance and Security are tightly interconnected. During one of our regular performance checks, we reviewed the four golden signals,...
May 30, 20232 min read
Â
Â
Â


Advanced Observability is Emerging as a Countermeasure from the Analysis of the COVID-bit Attack
Recently a researcher from Ben-Gurion University located a shocking IT security attack. He discovered that computers without internet...
Dec 22, 20221 min read
Â
Â
Â


Security as Code
We at Performetriks believe that appropriate security safeguard is a must-have for flawless software. Thus, from the beginning, we incorporate the most robust security controls and methodologies into all stages of our product, Gobenchmark . By 2023, 65% of the world’s population will have its personal data covered under modern privacy regulations, up from 10% in 2020, according to Gartner, Inc. Regarding a developing technology landscape, complex international data transfer,
Dec 14, 20222 min read
Â
Â
Â


Penetration Testing
What is Pen Testing? Penetration testing or pen testing simulates a cyber-attack. This method targets your computer system to identify...
Nov 29, 20223 min read
Â
Â
Â
bottom of page