Tag: risk-based authentication

Loading...
Pew Reveals What Americans Know About Cybersecurity...

Turns out, Americans still don’t know much about CyberSecurity. That’s according to new research from the Pew Data Center, which conducted a cybersecurity knowledge...

Read More Pew Reveals What Americans Know About Cybersecurity
E-commerce fraud rates spike 33% in 2016...

Has the EMV liability shift caused e-commerce fraud to increase 33% in 2016? According to Experian data, CNP fraud increased with Florida, Delaware, Oregon...

Read More E-commerce fraud rates spike 33% in 2016
Experian is recognized as a leading fraud solution pro...

Experian is recognized as a leading security solution provider for fraud and identity solutions in order to protect customers and financial...

Read More Experian is recognized as a leading fraud solution provider
FFIEC, KBA and the rest of the alphabet soup...

With the most recent guidance newly issued by the Federal Financial Institutions Examination Council (FFIEC) there is renewed conversation about knowledge based authentication. I...

Read More FFIEC, KBA and the rest of the alphabet soup
To KBA, or not to KBA; that is the question. Or is it?...

Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it...

Read More To KBA, or not to KBA; that is the question. Or is it?
Are you missing your anchor?...

By: Kristan Frend Imagine you’re on the #1 ranked relay swim team at the World Championships and you’re leading off. You finish your leg of...

Read More Are you missing your anchor?
Why a Risk-Based Approach to Compliance?...

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Read More Why a Risk-Based Approach to Compliance?
Current Business Drivers and Consequences...

Experian’s Fraud and Identity Solutions team recently conducted a webinar entitled: “A risk-based approach to finding opportunity in today’s market: New approaches to fraud, compliance,...

Read More Current Business Drivers and Consequences
Why a risk-based approach to compliance?...

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Read More Why a risk-based approach to compliance?
Risk-based authentication will play a prominent roll i...

As E-Government customer demand and opportunity increases, so too will regulatory requirements and associated guidance become more standardized and uniformly adopted.  Regardless of credentialing...

Read More Risk-based authentication will play a prominent roll in citizen access to government services
Happy holidays–walkin’ in a fraudster’s wonderla...

I have already commented on “secret questions” as the root of all evil when considering tools to reduce identity theft and minimize fraud losses. ...

Read More Happy holidays–walkin’ in a fraudster’s wonderland
Risk-based authentication….what’s new toda...

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Read More Risk-based authentication….what’s new today or tomorrow? Part 4
Generic fraud score – best practice, Part 1...

By: Kennis Wong In this blog entry, we have repeatedly emphasized the importance of a risk-based approach when it comes to fraud detection. Scoring and...

Read More Generic fraud score – best practice, Part 1
Risk-based authentication’s value proposition...

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Read More Risk-based authentication’s value proposition
Why risk-based authentication…and what is it, for that...

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Read More Why risk-based authentication…and what is it, for that matter?