Let’s get a few things straight, a couple of points that might go against what every payments and commerce professional knows, but which will be important for the rest of the story. Get the Full Story Complete the form to unlock this article and enjoy...
Well, let’s start with the bad news first, even at the risk of robbing some of the joy and optimism that comes with the new year. As bad as one might think the risks of cybercrime are (fraud, hacking, data breaches, customer and revenue loss,...
Comic books (along with their more sophisticated cousins, graphic novels) are treated not only as literature these days by fans and many scholars, but they also have a firm place in U.S. culture, in that sweet spot where “low” and “high” art meet. As well,...
It’s been six months since the General Data Protection became law of the land, at least in the European Union, and yet the majority of companies that must be in compliance with that mandate are woefully unprepared. Get the Full Story Complete the form to...
Computing power is dirt cheap, thanks to cloud infrastructure. Jurisdiction is always a few steps behind, though — who is really going to bust down the door at a server farm in Russia to arrest the operator? There exists a bounty of consumer ID and...
Let’s try this a different way, if only to make a vital point with insincerity. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter,...
Keeping yourself protected from criminals can often seem a daunting task. Even the most eagled-eyed person — for instance, a veteran tourist in a crowded plaza thick with professional pickpocket artists — probably lacks the laser focus, determination and experience of those bent on theft and other...
There may come a day, a generation or two from now, when stories about the data breaches and other hacking threats faced by payments and commerce operators in 2018 seem quaint — or, at the least, like relatively primitive foreshadowing of a new type of...
Payments and commerce fraud has its own ecosystem, one that includes criminals, servers and other computing devices, IP addresses, compromised payment cards and stolen personal data, and even houses and other physical locations. The various parts come together to produce a nefarious whole, one that...