Business Security Gets Crowdsourced
Business Security Gets Crowdsourced
August 24, 2015  |  Hmmm

As the nature of security threats, both physical and cyber, continue to evolve so have the strategies companies are using to combat the sophisticated nature...

READ MORE >
Uber Financials Breakdown — The Top 5 Takeaways
Uber Financials Breakdown — The Top 5 Takeaways
August 24, 2015  |  Mobile Commerce

With Uber headed for its global IPO next year, people got a sneak peek into the financials, booking and revenue as Reuters leaked the details...

READ MORE >
China Takes A Second Look At Bank IT Procurement Bans
China Takes A Second Look At Bank IT Procurement Bans
August 24, 2015  |  B2B Payments

Earlier this year, China raised eyebrows when reports said the nation’s officials had banned state-run agencies, including banks, from procuring IT services from foreign suppliers,...

READ MORE >
Alibaba Trade Assurance Now Covers Credit Card Purchases
Alibaba Trade Assurance Now Covers Credit Card Purchases
August 24, 2015  |  B2B Payments

Alibaba’s recent efforts to ease friction in cross-border B2B commerce included the launch of its Trade Assurance program, a venture that sees Alibaba vet international...

READ MORE >
Global Spotlight: Mexico, Brazil & Argentina
Global Spotlight: Mexico, Brazil & Argentina
August 24, 2015  |  B2B Payments

Mexico, Brazil and Argentina have teamed up to launch a pilot program that strengthens cooperation between the countries in exchanging digital invoices. The nations are...

READ MORE >
Taxpayers Sue IRS Over Data Breach
Taxpayers Sue IRS Over Data Breach
August 24, 2015  |  News

While the Internal Revenue Service is still dealing with the repercussions of the massive cyber attack that compromised the data from tax returns for roughly...

READ MORE >
Facebook’s Cybersecurity Platform Hits Critical Mass
Facebook’s Cybersecurity Platform Hits Critical Mass
August 24, 2015  |  News

More than 90 companies are now using Facebook’s cybersecurity platform ThreatExchange to share security and threat information.

READ MORE >