Blog
Our latest insights and articles covering payments, tech, and much more
Payments news, latest insights and articles
Explore Our Latest Insights
Stay updated with our financial insights and trends.
Open Banking Payments 7 min read
Open Banking Payment Methods
Open banking payments are revolutionizing financial transactions by enabling secure, customer-author...
Read morePXP Financial - Log4shell security response
On 9th December 2021, Information security researchers reported the discovery of a critical vulnerab...
How to maximise business-as-usual security
By Graeme Zwart, Head of Security We shine a light on the ordinary, day-to-day work that helps make ...
Data security: defence in depth
By Graeme Zwart, Head of Security A layered approach to security is the most effective. We provide t...
How to counter the psychology of scams
By Graeme Zwart, Head of Security Scams may change but the underlying psychology doesn’t. We present...
How to protect your business from Covid-19 related scams
By Graeme Zwart, Head of Security Covid-19 has caused both legitimate and illegitimate businesses to...
How PCI DSS requirements help inform third-party risk management
Globalisation and competitive pressure is leading to greater outsourcing and more complex supplier r...
How to manage third-party risk
Collaboration is one of the strengths of the payment industry. But any strength can also be weaponis...
A beginner’s guide to risk assessments
By Graeme Zwart, Head of Security Time, budget and resource are finite for every organisation. So, s...
What bicycles can tell us about information security
By Graeme Zwart, Head of Security A psychology paper on the science of bicycles provides some useful...
The Dunning-Kruger effect in information security
By Graeme Zwart, Head of Security A little knowledge is a dangerous thing. But when it comes to info...
Strong customer authentication: ready, test, go…
Merchants in Europe and the UK are getting ready for the new strong customer authentication requirem...
The exceptions which prove the rule
Where there are laws, there are loopholes. Where there are conditions, there are caveats. New EU str...
Strong customer authentication: mythbuster
The EU strong customer authentication requirements have evolved over time with the publication of va...
Information security beyond PCI DSS
In the modern economy, data equals money. Google, Amazon, Facebook, Apple and others have built whol...
5 tips for maintaining good security
Sometimes good security hygiene is not about shiny, new tools or big-budget initiatives. It’s about ...
How to fight back against e-mail phishing attacks
In the second in our series of how to fight back against attempts to hack the human element within y...
What makes the hospitality industry an attractive target for data thieves?
Historically the hospitality industry has held cardholder data across more systems and for longer co...
How to fight back against malware
Computer viruses, worms and spyware have been around for years — even before the first use of the te...
How to fight back against CEO fraud
Over the next few months we're going to look at how to fight back against various types of cyber att...
Tokenisation for cruise operators
Tokenisation is much talked about in a variety of payment contexts at the moment, so we thought we’d...