Payments transactions generate plenty of useful data for merchants. But wrangling that data into informative shape gets challenging, especially when multiple acquirers, gateways, processors, or other service providers are used. Each one has a different approach to reporting and some are (much) better than others. Developing a consolidated view and, as important, reconciling financials from […]
Digital identity is the black hole of the internet. Our online lives simply aren’t protected by a system without strong authentication. Killing the password is Mission One for security professionals because they’re so readily stolen through phishing attacks and malware. Users, warned to make passwords complex and unique, have no hope of remembering them. And a […]
Extension of credit to people in developing markets has been a long time challenge. Banks, of course, look to repayment history to make such determinations but in much of the world, banking relationships and repayment track records are few. But history has demonstrated that extension of credit in developing markets can be effective and profitable. Just look at the Grameen […]
The domain of point of sale (POS) has three legs to its security stool: EMV, point to point encryption, and card number tokenization. Card not present (CNP) merchants and issuers have the more challenging task of assembling fraud mitigation tools on their own. The networks have had, until EMVCo’s move into payment card tokenization, not […]
Apple Pay’s announcement has brought attention to biometrics and their role in payments security and to the broader, if amorphous, concept of online identity. Steve Wilson of Constellation Research and Glenbrook’s George Peabody discuss local and cloud-based biometrics, identity attributes, and the vexing challenges of privacy.