Faster B2B payments, back-office automation and alternative payments are all advancing rapidly, but these advances are creating new opportunities for fraudsters, so expect the innovation...
Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....
When criminals impersonate company executives or business partners to deceive employees into diverting funds their way, that’s business email compromise (BEC). Get the Full Story...
An interview with Pablo Molina, former chief information officer and vice president of IT at Georgetown University and current chief information security officer at Drexel...
Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....
Organizations face numerous threats concerning B2B payments processing as bad actors look for ways to alter banking information and redirect B2B payments into the wrong...
Sanctions have been dominating headlines. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content...
The transition of employees to working from home has made critical business systems and processes more vulnerable to attack, resulting in an increase of B2B...
Cybercriminals now operate on a wide scale, and they use a variety of sophisticated tactics to compromise security measures and commit B2B payments fraud. Get...