Ecommerce / Retail

Loading...
Digging a Wider Moat: Apple Shifts to Loyalty...

Apple eschewed banks for a retailer focus onstage at their Worldwide Developers Conference (WWDC) when it spoke to payments. I sense this is an intentional...

Read More Digging a Wider Moat: Apple Shifts to Loyalty
Does social media change the data governance field?...

The age of social media and data regulations Last week I presented at the 27th Annual Card Forum and Expo and the conference highlighted...

Read More Does social media change the data governance field?
Understanding Gift Card Fraud Part 2: Fraudsters love ...

Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...

Read More Understanding Gift Card Fraud Part 2: Fraudsters love gift cards, too!
Understanding Gift Card Fraud Part 1: Their prevalence...

Gift card fraud Gift cards have risen in popularity over the last few years— National Retail Federation anticipated more than $31B in gift card...

Read More Understanding Gift Card Fraud Part 1: Their prevalence in modern society
How have identity verification techniques evolved?...

The evolution of identity verification Knowing who you are doing business with isn’t just a sound business practice to protect your bottom line. In...

Read More How have identity verification techniques evolved?
After a Breach… Now What?...

The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...

Read More After a Breach… Now What?
#FraudLifecycle Series: The Role of Balancing Fraud Pr...

In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...

Read More #FraudLifecycle Series: The Role of Balancing Fraud Prevention
#Fraudlifecycle; turning the tables on cyber criminals...

Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....

Read More #Fraudlifecycle; turning the tables on cyber criminals
Inside the mind of today’s cyber criminal...

Online crooks are getting more sophisticated by the second. Nowadays, fraudsters have the ability to conduct “clean fraud,” obtaining legitimate identities of users from...

Read More Inside the mind of today’s cyber criminal
Trust me – how unnecessary declines affect your busine...

Surag Patel, vice president of global product management for 41st Parameter, led a panel discussion on Digital Consumer Trust with experts from the merchant...

Read More Trust me – how unnecessary declines affect your business
Uncloaking Synthetic Identities – Revealing the Ring...

As we prepare to attend next week’s FS-ISAC & BITS Summit we know that the financial services industry is abuzz about massive losses from the...

Read More Uncloaking Synthetic Identities – Revealing the Ring
Definition of Existing Account Fraud...

By: Kennis Wong On the surface, it’s not difficult to define existing account fraud. Obviously, it is fraud perpetrated against an existing account. But...

Read More Definition of Existing Account Fraud
The consumer’s responsibility in preventing iden...

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

Read More The consumer’s responsibility in preventing identity theft
Rules vs. Risk...

The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...

Read More Rules vs. Risk
Is that really your business customer making the chang...

By: Kristan Frend I recently gave a presentation on small business fraud at the annual National Association of Credit Managers (NACM) Credit Congress.  Following...

Read More Is that really your business customer making the change of address request for the shipment?