Blog Posts

Displaying 21 - 25 of 512
November 7, 2016 by Julie Conroy

A couple weeks ago at Money 20/20, my co-presenter (Brian Byrne from EMVCo) demoed the new-and-improved version of 3-D Secure (3DS) to a packed house of payment industry professionals. There’s been a renewed industry interest in 3DS leading up to this launch—I’ve received more inquiries from clients about 3DS in the past six months than I have in my entire six years at Aite Group. So the big question is, will we see a big incremental adoption of 3DS 2.0?

October 31, 2016 by Julie Conroy

The fourth annual Money 20/20 is in the books. While official attendance figures have not yet been released, this one felt even bigger than last year. Five analysts from Aite Group attended: Christine Barry, Julie Conroy, Ben Knieff, Tiffani Montez, and Thad Peterson. Here are a few key takeaways from the team: 

October 19, 2016 by Ben Knieff

I had the pleasure to speak at the Digital Identity Summit hosted by ThreatMetrix last week in Los Angeles, California. There were a number of great sessions representing banking/financial services, e-commerce, payment service providers (PSPs), and other service providers. It was really interesting to observe similar use cases being applied to very different businesses with similar challenges.

October 17, 2016 by Javier Paz

For all their troubles going about alpha generation, algorithmic traders get remarkable little respect these days. Last week while I was attending The Trading Show in New York, a select group of quant-oriented, buy-side participants and fintech enablers debated the limits of traditional computers in financial research and, conversely, of quantum computing’s promise. Many of these investors chase new paradigms for investing. For this, they look for high-quality unstructured data, they invest in quants from various disciplines, they give machines a greater role spotting and acting upon trading opportunities, and they manage a variety of risks.

October 6, 2016 by Ben Knieff

With data breaches reported nearly daily, it is no stretch to think pretty much everyone’s card information has been compromised at some point. Criminals typically use only a fraction of stolen card information, but this week, I was one of the (un)lucky ones to have my card compromised and used.

Pages