Experian recently contributed to a TSYS whitepaper focused on the various threats associated with first party fraud. I think the paper does a good job...
By: Kenneth Pruett I really thought I was going to be on easy street after receiving two emails in less than a week. The...
In my last entry I mentioned how we’re working with more and more clients that are ramping up their fraud and compliance processes to...
Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...
Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress,...
Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...
Working with clients in the financial sector means keeping an eye toward compliance and regulations like the Gramm-Leach-Bliley Act (GLB), the Fair Credit Reporting...
By: Kristan Frend It seems as though desperate times call for desperate measures- with revenues down and business loans tougher than ever to get, “shelf”...
The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...
By: Kristan Frend As if business owners need one more thing to worry about — according to the Javelin Strategy & Research’s 2010 Identity...
There are a number of people within the industry heralding the death of knowledge based authentication. To those people I would say, “In my humble...
A few days ago I saw an article about hackers working from Russia, while committing check fraud in the United States. In what those...
I often provide fraud analyses to clients, whereby they identify fraudsters that have somehow gotten through the system. We then go in and see...
I have already commented on “secret questions” as the root of all evil when considering tools to reduce identity theft and minimize fraud losses. ...
Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...