OnPay, CapX Partner On AP Automation

OpenEnvoy Launches To Provide B2B Invoice Auditing

OnPay Solutions, which works in accounts payable (AP) automation, has struck a partnership with business innovation intelligence platform CapX to offer new supplier payment automation for clients, according to a press release.

    Get the Full Story

    Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

    yesSubscribe to our daily newsletter, PYMNTS Today.

    By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

    CapX allows clients to better adopt technology through a curated suite of products, holistic optimization strategies, and workforce solutions that can help with savings, efficiency and revenue streams, the release stated.

    “We are thrilled to partner with OnPay [Solutions] and introduce our clients to the incredible benefits of accounts payable automation,” said Lindsay Tsumpes, co-CEO of CapX, in the release. “Our focus is on finding great solutions that can help organizations free up time, optimize operations, and reallocate valuable resources. We were impressed that OnPay’s solutions provide all of these benefits and more without any capital expense, making it a highly accessible tool for a variety of businesses.”

    Neal Anderson, CEO and president of OnPay Solutions, said in the release that the company is glad to be participating in the partnership.

    “Our mission is to empower people to improve the lives of accounting departments globally,” he said, according to the release. “We are excited to provide CapX with additional tools to help accomplish that mission by eliminating paper-based payments for their clients.”

    Last year, OnPay Solutions Founder and Chief Operating Officer Julie Negrete-Anderson spoke with PYMNTS about the perception of switching to digital AP processes, which wasn’t as high as some companies seemed to think. She said some organizations hadn’t evaluated the costs because they were “baked into” how they were looking at department expenses.

    Negrete-Anderson said companies failing to update their old-style paper methods would feel the burn when it came down to the financial cost of that paper, with the cost of labor and inefficiencies built into legacy workflows also not helping. She said some companies end up adopting a “don’t fix what isn’t broken” mindset, which can be tough to address because workflow optimization might not be able to be achieved just by adopting a digital tool.


    Air France-KLM Hack Underscores Common Tactics to Watch Out For

    Air France KLM plane

    Highlights

    The human layer remains the most targeted and effective vector for compromise, even in highly regulated industries like aviation and finance.

    Supply chain risks now outweigh perimeter breaches, as organizations increasingly depend on cloud-based, interconnected platforms.

    Ransom demands and extortion tactics are becoming more strategic, often aimed at reputation damage rather than just financial theft.

    The business perimeter has become as global and interconnected as commerce itself.

      Get the Full Story

      Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

      yesSubscribe to our daily newsletter, PYMNTS Today.

      By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

      On Aug. 6, Air France and KLM issued a public disclosure announcing that customer data had been compromised following a security incident involving a third-party service provider used by their customer contact centers.

      The airline group confirmed that personal details such as names, email addresses, phone numbers, frequent flyer numbers and customer service message metadata were exposed. Crucially, no passwords, payment information, or ID documents were affected, according to official statements.

      The breach represents a textbook case of third-party risk. While the airline’s internal infrastructure remained secure, attackers gained access through a platform integrated into customer operations. Organizations increasingly rely on external vendors like CRM systems, ticketing services or marketing tools, which creates a complex digital supply chain where indirect access can lead to direct consequences.

      That’s why, in 2025, being secure means more than securing systems. It means securing relationships, data flows and the human behaviors that surround them.

      Read more: Know Your Sector, Know Your Scam: eCommerce Fraud in 2025 

      Mitigating Third-Party Supply Chain Risks Is Key to Enterprise Security

      The incident involving Air France and KLM is not an outlier but an example of how vulnerable modern organizations have become, even those with significant resources, to widely known but highly effective intrusion techniques. The breach is ultimately part of a broader trend: attackers exploiting the human element and targeting the digital supply chain.

      The PYMNTS Intelligence August 2025 Certainty Project report, “Vendors and Vulnerabilities: The Cyberattack Squeeze on Mid-Market Firms,” found widespread fears about social engineering targeting payments, with 87% of mid-market firms at least somewhat concerned.

      At the same time, B2B cyber audits can help organizations assess their security posture, identify vulnerabilities and build trust with partners and clients. For C-suite leaders, these audits are not just about compliance but about safeguarding their enterprise’s long-term stability, resilience and trust.

      Phishing via look-alike login portals remains a persistent threat. In these attacks, users are directed to fake login pages designed to replicate legitimate services, often via email, SMS, or compromised chat platforms. Once credentials are entered, attackers use them to access corporate systems or third-party SaaS platforms.

      A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH and Adidas, for instance, was tied by Google researchers to a hacker group using voice phishing attacks to steal data from Salesforce CRM instances.

      Threat actors are also now commonly using search engine optimization (SEO) poisoning to place malicious pages near the top of search results. These pages can often mimic legitimate login portals, software downloads, or vendor sites. Employees searching for “vendor login” or “partner portal” may be misled into visiting compromised sites.

      See also: What B2B Firms Can Learn From Big Tech’s Cybersecurity Initiatives

      The Changing Face of Today’s Enterprise Cyber Risk Landscape

      In a globally interconnected economy, the traditional fortress model of cybersecurity has become obsolete. The “perimeter” now encompasses not just a company’s own systems, but every partner, platform and subcontractor touching its data.

      While vulnerabilities in code and configuration remain important, human factors often seal the breach. Attackers increasingly combine technical compromise with psychological manipulation.

      In security circles, the model is called the “extended enterprise.” In practice, it’s a digital ecosystem where the old perimeter model — defending your own network from the outside world — has been replaced by an intricate web of shared connections.

      Cybersecurity is no longer an IT-only function. It is a business risk, a customer trust issue and in some sectors, a matter of regulatory survival. CISOs are finding new allies in CFOs and COOs who increasingly see security investments as risk mitigation for business continuity. The conversation is no longer about “if” a breach will happen, but “where” and “through whom.”

      The PYMNTS Intelligence report “The AI MonitorEdge Report: COOs Leverage GenAI to Reduce Data Security Losses” found that the share of chief operating officers (COOs) who said their companies had implemented AI-powered automated cybersecurity management systems leapt from 17% in May 2024 to 55% in August.

      Mitigating this risk requires both technology and governance: rigorous vendor vetting, contractual clarity, continuous monitoring, and a corporate culture that treats security as a shared responsibility.