Apply DA Tag

Loading...

In my last blog, I discussed the basic concept of a maturation curve, as illustrated below: Exhibit 1 In Exhibit 1, we examine different...

Published: November 25, 2009 by Jeff Bernstein

–by Jeff Bernstein In the current economic environment, many lenders and issuers across the globe are struggling to manage the volume of caseloads coming...

Published: November 23, 2009 by Jeff Bernstein

–by Andrew Gulledge Definition and examples Knowledge Based Authentication (KBA) is when you ask a consumer questions to which only they should know the...

Published: November 23, 2009 by Andrew Gulledge

By: Tom Hannagan Understanding RORAC and RAROC I was hoping someone would ask about these risk management terms…and someone did. The obvious answer is...

Published: November 19, 2009 by Guest Contributor

Round 1 – Pick your corner There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one...

Published: November 16, 2009 by Monica Pearson

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Published: November 16, 2009 by Keir Breitenfeld

Recent findings on vintage analysis Source: Experian-Oliver Wyman Market Intelligence Reports Analyzing recent vintage analysis provides insights gleaned from cursory review Analyzing recent trends...

Published: November 2, 2009 by Kelly Kent

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Published: October 13, 2009 by Keir Breitenfeld

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

Published: October 9, 2009 by Keir Breitenfeld

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Published: September 30, 2009 by Keir Breitenfeld

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Published: September 24, 2009 by Keir Breitenfeld

By: Kennis Wong As I said in my last post, when consumers and the media talk about fraud and fraud risk, they are usually referring to...

Published: September 8, 2009 by Guest Contributor

Analysis opportunity for vintage analysis Vintage analysis, specifically vintage pools, present numerous useful opportunities for any firm seeking to further understand the risks within specific portfolios....

Published: September 4, 2009 by Kelly Kent

By: Kennis Wong When consumers and the media talk about fraud and fraud risk, nine out of ten times they are referring to third-party...

Published: September 4, 2009 by Guest Contributor

Vintage analysis 101 The title of this edition, ‘The risk within the risk’ is a testament to the amount of information that can be...

Published: July 13, 2009 by Kelly Kent

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe