Draft guidelines on the security measures under PSD2
Swift’s response to the European Banking Authority’s Consultation Paper on “Draft Guidelines on the security measures for operational and security risks of payment services under PSD2”
A balance of expectations
In the second part of a three-part interview, Gottfried Leibbrandt, CEO, Swift discusses the challenge of pursuing new opportunities while remaining true to its mission.
Fixed Fee Reporting Automation
In order to provide its Fixed Fee customers with highly accurate and updated information, Swift has automated its Fixed Fee Reporting process.
Banco de Credito del Peru (BCP) - Case Study
Banco de Crédito del Perú (BCP) – Swift GPI ayuda a los bancos a mejorar su relación con el cliente impulsando la transparencia, trazabilidad y rapidez
Cybersecurity getting started guide
This document provides general and non-binding guidance for Swift users on how to use and interpret cybersecurity data from counterparties within the financial services ecosystem.
How Cyber Attackers Could Target the World’s Financial Markets
The cyber threats faced by key financial markets across the world have been exposed by a new report published today by BAE Systems and Swift.
Press Release: How Cyber Attackers Could Target the World’s Financial Markets
The cyber threats faced by key financial markets across the world have been exposed by a new report published today by BAE Systems and Swift.
Regional African bank protects connection to global financial system
Looking for a cost-effective and simple solution, a regional African bank took advantage of Swift Payment Controls to monitor its outbound payments in real time.
Payments: Looking to the future - Stephen Lindsay
Stephen Lindsay, Swift’s Head of Standards, explains the pivotal role global and open standards play in making international payments faster and more efficient.
Sibos 2019 session - Live Demo: Hacker vs bank - The long awaited
The Swift Red Team delivers a fun and informative demonstration showing why it’s necessary to implement a comprehensive security program as opposed to just “checking the boxes”.