by George Peabody | May 16, 2017
Payments transactions generate plenty of useful data for merchants. But wrangling that data into informative shape gets challenging, especially when multiple acquirers, gateways, processors, or other service providers are used. Each one has a different approach to...
by George Peabody | Jun 30, 2016
Digital identity is the black hole of the internet. Our online lives simply aren’t protected by a system without strong authentication. Killing the password is Mission One for security professionals because they’re so readily stolen through phishing...
by George Peabody | May 1, 2016
Extension of credit to people in developing markets has been a long time challenge. Banks, of course, look to repayment history to make such determinations but in much of the world, banking relationships and repayment track records are few. But history...
by George Peabody | Jul 21, 2015
The domain of point of sale (POS) has three legs to its security stool: EMV, point to point encryption, and card number tokenization. Card not present (CNP) merchants and issuers have the more challenging task of assembling fraud mitigation tools on their own. The...
by George Peabody | Oct 6, 2014
Apple Pay’s announcement has brought attention to biometrics and their role in payments security and to the broader, if amorphous, concept of online identity. Steve Wilson of Constellation Research and Glenbrook’s George Peabody discuss local and...