Fraud & Identity Management

Loading...

— by, Andrew Gulledge The intelligent use of question weighting in KBA should be a no-brainer for anyone using out of wallet questions. Here’s...

October 19, 2010 by Andrew Gulledge

By: Margarita Lim You may be surprised to learn that identity theft isn’t just a crime committed by an individual or individuals. There are...

October 18, 2010 by Guest Contributor

By: Margarita Lim Consumer data has increasingly become commoditized over the years. There’s a lot of it and it’s arguably more easily obtainable. Social...

October 13, 2010 by Guest Contributor

By: Kenneth Pruett I really thought I was going to be on easy street after receiving two emails in less than a week. The...

October 7, 2010 by Guest Contributor

In my last entry I mentioned how we’re working with more and more clients that are ramping up their fraud and compliance processes to...

September 24, 2010 by Matt Ehrlich

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

September 20, 2010 by Matt Ehrlich

Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress,...

September 16, 2010 by Monica Pearson

Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...

September 10, 2010 by Matt Ehrlich

Working with clients in the financial sector means keeping an eye toward compliance and regulations like the Gramm-Leach-Bliley Act (GLB), the Fair Credit Reporting...

September 10, 2010 by Monica Pearson

Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...

September 10, 2010 by Matt Ehrlich

By: Kennis Wong   In the last post, I emphasized the importance of fraud detection even after an account has been approved. If information...

September 2, 2010 by Guest Contributor

By: Kennis Wong Most lenders authenticate applicants before they extend credit. With identity theft so prevalent today, not ensuring you are dealing with the real...

August 31, 2010 by Guest Contributor

By: Kristan Frend It seems as though desperate times call for desperate measures- with revenues down and business loans tougher than ever to get, “shelf”...

August 27, 2010 by Guest Contributor

The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...

August 23, 2010 by Keir Breitenfeld

By: Kristan Frend As if business owners need one more thing to worry about — according to the Javelin Strategy & Research’s 2010 Identity...

August 23, 2010 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe