Cash Automation
Strengthening ATM Protection Against Emerging Threats ATM jackpotting attacks continue to evolve, targeting vulnerabilities in both physical hardware and internal system configurations. To help financial institutions stay ahead of these threats, Hyosung Americas has issued a new security recommendation designed to further protect ATM fleets from unauthorized access and exploitation. As a long-standing provider of […]
Electronic Security
Artificial intelligence (AI) continues to dominate industry discussions – and for good reason. In a recent Wittenbach blog article, AI in Security Video Surveillance (https://wittenbach.com/ai-in-security-video-surveillance/), we explored the topic at a high level. That overview provides helpful context and is worth reviewing before diving deeper. This article focuses more narrowly on where AI is delivering […]
Managed Services (FI)
Banking has undergone a major shift over the past decade. Branches have transitioned toward open layouts, universal bankers, and customer-first experiences that minimize physical barriers between staff and visitors. This strategic shift improves service and visibility — but it also introduces new security and compliance challenges. While branch formats have evolved, many institutions still rely […]
Electronic Security
ATM Shutter Gluing Attacks: A Critical Safety Awareness Update for Field Technicians ATM attacks continue to evolve, and a recently reported method presents a serious personal safety risk to field service technicians—particularly those servicing remote or island ATM locations. This article outlines how the attack works and reinforces the safety practices technicians must follow when responding […]
Electronic Security
Most people understand what access control is, what it offers, and why it’s essential. It enables seamless entry and exits from rooms and buildings using a range of credentials—PINs, fobs, badges, biometrics—forming a critical pillar of modern security infrastructure. But the technology behind those credentials and readers deserves careful consideration before simply requesting “access control” […]