Payments, Software & Technology – January 5, 2010

  • Securosis BlogSecurosis + Security Incite Merger FAQ
    January 5, 2010 – This:

    “Will all the research remain free and available on the Securosis blog?

    Yes, all of the Securosis primary research will continue to be published on the blog. Our research may be packaged up and available in document form from our sponsors, but the core research will always appear first on the blog. This is a critical leg of the Totally Transparent Research model. Our community picks apart our research and makes it better. That makes the end result more actionable and more effective.”

    is simply powerful. Transparent, available research (particularly in the area of security) is extraordinarily important and valuable to the industry.

  • The Financial Services Club's Blog2010: what’s in store for the technology of banking?
    January 5, 2010 – I find the perspective given in the “real-time becomes normal” section exceptionally intriguing…

    As an avid real-time communication user (and yes, that includes my mobile phone) the assumption of a real-time experience, akin to what I experience in my social endeavours, in my financial experience is a logical leap.

    Given my experience with transaction processing and payments in general, I’ve come to “accept” (albeit grudgingly) the “why” behind the D+ and T+ discussions. But, as a typical consumer, (or even a technology savvy developer with little experience in transactional engagements) the expectation of real-time, put in the context given in this post, is understandable.

    It is the process of putting ourselves into the mindset of others where we can gain additional clarity…

  • Securosis BlogPassword Policy Disclosure
    January 5, 2010 – Quite! I was rather surprised when I saw the method by which they chose to implement prohibited passwords. I do believe this was originally implemented with the best of intentions…providing additional security for their user base.

    It is an interesting thought exercise in the process of adding “security”, when not done carefully/properly, is not always the best method of reducing risk.

  • Securosis BlogMy Personal Security Guiding Principles
    December 30, 2009 – That’s “all” you’ve got? Those 5 principles are sufficient to cover the vast majority of situations I’ve happened upon (in payments, in government sector, in enterprise, in consulting). The distillation into the list is excellent…I think it deserves printing and hanging on the wall in my office.

January 5, 2010

Leave a Reply

Your email address will not be published. Required fields are marked *