When your customers make a card payment, they aren’t just expecting you to deliver a quality product or service. They’re also trusting you to keep their sensitive cardholder data out of the hands of cybercriminals.
This is the second part of our card testing series. For more background about what card testing is and who’s at risk, check out part one.
Imagine waking up to find your site bombarded by thousands of transactions. “Yipee!” you think. “My hard work is paying off.” But, you look closer and see that all the purchases are small, and for some reason, they don’t make sense. You realize they’re fraudulent.
In this article, originally published by PYMNTS.com, CyberSource expert Carl Tucker speaks to the advantages of moving away from manual review and more toward automated detection. ;
Around the globe, women everywhere are driving change in extraordinary ways. From entrepreneurs, musicians, developers, coaches, teachers, medical professionals and more, empowered women in every industry are blazing forward and innovating for the betterment of all. ;
We're excited to announce the CyberSource pilot program for the OAuth 2.0 authorization framework! OAuth 2.0 greatly simplifies the workflows for anyone looking to securely connect their accounts across multiple software vendors without sharing their passwords.
In this article originally published by 451 Research, analyst Jordan McKee discusses how our recent acquisition of Payworks will help create a fully integrated payment acceptance solution for merchants and acquirers.
Strong customer authentication (SCA) has understandably been a major priority for the payment industry. While everyone focuses on compliance and on minimizing the impact on customer experience, it’s easy to forget that SCA will also have an impact on fraud—and merchants should be ready for it.