The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...
I recently attended a conference where Credit Union managers spoke of the many changes facing their industry in the wake of the real estate...
By: Wendy Greenawalt The auto industry has been hit hard by this Great Recession. Recently, some good news has emerged from the captive lenders, and...
By: Wendy Greenawalt Optimization has become somewhat of a buzzword lately being used to solve all sorts of problems. This got me thinking about what...
By: Wendy Greenawalt In my last few blogs, I have discussed how optimization can be leveraged to make improved decisions across an organization while considering...
By: Wendy Greenawalt The economy has changed drastically in the last few years and most organizations have had to reduce costs across their businesses...
Meat and potatoes Data are the meat and potatoes of fraud detection. You can have the brightest and most capable statistical modeling team in...
To calculate the expected business benefits of making an improvement to your decisioning strategies, you must first identify and prioritize the key metrics you...
By: Wendy Greenawalt Given the current volatile market conditions and rising unemployment rates, no industry is immune from delinquent accounts. However, recent reports have...
In my previous two blogs, I introduced the definition of strategic default and compared and contrasted the population to other types of consumers with...
By: Wendy Greenawalt In my last blog on optimization we discussed how optimized strategies can improve collection strategies. In this blog, I would like...
In my last post I discussed the problem with confusing what I would call “real” Knowledge Based Authentication (KBA) with secret questions. However, I don’t...
The value of a good decision can generate $150 or more in customer net present value, while the cost of a bad decision can...
Well, here we are nearly at the beginning of November and the Red Flags Rule has been with us for nearly two years and...
In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication. In this...