Authentication

Photo: Scott Loftesness   A few weeks ago I joined my client Raj Jain, CEO of RS Software, for my third visit to India. RS Software is headquartered in Kolkata which was our first stop for the annual general meeting of shareholders. After that, we visited Mumbai and Bangalore – along the way we met […]

{ 0 comments }

Digital identity is the black hole of the internet. Our online lives simply aren’t protected by a system without strong authentication. Killing the password is Mission One for security professionals because they’re so readily stolen through phishing attacks and malware. Users, warned to make passwords complex and unique, have no hope of remembering them. And a […]

{ 0 comments }

As new forms of digital payments begin to take hold, the old assumptions no longer work. What does it mean to issue a card when there is no card? How can transactions be risk-managed when payments credentials are masked and scrambled by design? And what is the impact on the loyalty and reward programs that […]

{ 0 comments }

Since the first promise to pay was made, knowing who you’re dealing with has been a requirement. Authenticating the identity of a trading partner – a customer, an accountholder, a business or even a computer – is a burden that falls on the one extending trust because the giver takes on the transaction risk. In online […]

{ 0 comments }

You may have heard about the Reserve Bank of India’s decision to create a new category of “payments banks”. Recently, the Reserve Bank of India approved 11 applicant institutions (out of 41 who had applied) to start the process of becoming licensed. The group includes telcos, non-bank financial institutions, retailers, entrepreneurs and the Department of […]

{ 4 comments }

The 3D Secure protocols, one for each network, that connect ecommerce merchants to the cardholder’s issuer, has had a rough go. But after ten years, smarter application of the tool and, in particular, risk-based usage makes it more attractive to both issuers and merchants. In this conversation with Mike Roche, VP of Consumer Authentication at […]

{ 0 comments }

One of the fun things we do at Glenbrook is help clients think through product concepts in financial services, commerce, and payments. An intriguing area that I’ve been thinking about and watching closely over the years is voice-activated purchasing. My interest in “voice” stems from my belief that as microprocessors get smaller and faster, the […]

{ 1 comment }

It’s always intriguing to watch how a good idea evolves into new areas. Such evolution often happens when designers find new applications for their ideas. Brian Merritt and Ryan Hildebrand were part of the early team at Simple that was subsequently sold to BBVA. In mid-February, they announced the formation of Seed, a Y Combinator […]

{ 0 comments }

Apple Pay’s announcement has brought attention to biometrics and their role in payments security and to the broader, if amorphous, concept of online identity. Steve Wilson of Constellation Research and Glenbrook’s George Peabody discuss local and cloud-based biometrics, identity attributes, and the vexing challenges of privacy.

{ 0 comments }

The Apple Pay announcement finally came yesterday and the company’s orchestration of much of the complex and fractious card payments ecosystem demonstrates Apple’s insight into how the current payments ecosystem works and how it must be aligned in order to meet its own needs. Combining NFC, Apple’s Passbook wallet, Touch ID biometric reader, cards stored in the […]

{ 2 comments }

One of the pleasures of joining Glenbrook has been getting to know what and how the other Glebrookers think about what’s happening in the payments industry.  We talk a lot at Glenbrook. Over iChat, email, mobile phones, Skype, Google Hangout with voice and video, through Google Docs, and whenever we meet up for client work […]

{ 3 comments }

Tuesday’s collapse of pioneer Bitcoin exchange Mt.Gox has been widely covered by the international tech and general media. There’s no doubt quite a story behind its demise. The rumored theft of hundreds of millions of dollars in bitcoin will provide plenty of fodder for journalists and investigators. The pain of those who lost their bitcoin […]

{ 0 comments }

The news from Target, increasing the number of cards compromised to 70 million and the expansion of data loss to mailing and email addresses, phone numbers, and names, affirms that we’re in a security crisis.  As my colleague Scott Loftesness puts it, card data is, from a brand and business perspective, the new radioactive material.  […]

{ 4 comments }

The arrest of eight in New York who participated in a global $45 million ATM cash-out attack revealed, once again, some hard truths about the cyber security posture of financial systems and the enterprises that operate essential payment infrastructure. First, the organization and sophistication of the attackers continues to improve.  These are global organizations peopled […]

{ 1 comment }

Every year I try to attend what I think of as the PayPal Developers Conference. This year what used to be the PayPal X Innovate Conference was expanded to include eBay app development, Magento app development, and –– most importantly –– X.commerce app development. X.commerce is eBay’s new end-to-end, multi-channel commerce technology platform. While most […]

{ 2 comments }

Clicky Web Analytics