State of the art today, in the war against fraud, is a combination of risk scoring engines plus various types of "Block Lists". But, how effective are these methods? (http://help.yahoo.com/help/us/store/risk/risk-25.html)
Reputation of a device is emerging as the next generation technology and raises best practices up to the next level.
Thursday, May 31, 2007
Friday, May 18, 2007
Back to "Old" School Security
Old School Security
The best fraud solutions today are still based upon "old school" architectures. The web was invented for surfing information freely and anonymously. Browsers are not well equipped for security and commerce. The most secure communications today over TCP/IP are still client-server based architectures. Haven't you wondered why iTunes is NOT a web-site? Two fundamental reasons, 1) client-server is still the most secure method of doing commerce, and 2) you can program so many more capabilities into a downloadable application then you can into a web-page.
The best fraud solutions today are still based upon "old school" architectures. The web was invented for surfing information freely and anonymously. Browsers are not well equipped for security and commerce. The most secure communications today over TCP/IP are still client-server based architectures. Haven't you wondered why iTunes is NOT a web-site? Two fundamental reasons, 1) client-server is still the most secure method of doing commerce, and 2) you can program so many more capabilities into a downloadable application then you can into a web-page.
Subscribe to:
Posts (Atom)