Fitting 3D-Secure with Payments Architecture

Fitting 3D-Secure with Payments Architecture

Fitting 3D-Secure with payments architecture This post is not an explainer about 3D-Secure 2.X (3DS2). If you are looking for a better understanding of this topic before diving in, here’s a list of resources that we’ve curated to answer the following questions:  What...
An ID fraudsters can’t shake: Device Identification & Reputation

An ID fraudsters can’t shake: Device Identification & Reputation

In the ongoing game of cat and mouse between fraudsters and organizations with an online presence, two forces are paramount: preventing fraud while also minimizing friction for the user. Add too many steps in the user’s authentication process, they’ll drop off. Which...