Fraud & Identity Management

Loading...

In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...

Published: October 3, 2014 by Maria Scalone

Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....

Published: September 29, 2014 by Maria Scalone

Cherian Abraham, our mobile commerce and payments consultant, recently wrote about the future of mobile banking in regards to the Apple Pay news out...

Published: September 12, 2014 by Matt Tatham

By: Maria Moynihan At a time when people are accessing information when, where and how they want to, why aren’t voter rolls more up...

Published: September 3, 2014 by Guest Contributor

More than ever before, there may now be credence in the view that the majority of consumers’ personally identifiable information (PII), user names and...

Published: August 22, 2014 by Keir Breitenfeld

As data breaches continue to attract publicity, consumers are expecting more from impacted organizations....

Published: August 22, 2014 by Carrie Janot

Online crooks are getting more sophisticated by the second. Nowadays, fraudsters have the ability to conduct “clean fraud,” obtaining legitimate identities of users from...

Published: August 8, 2014 by Maria Scalone

Companies are facing incredible difficulties identifying fraud risks at the point of origination. Setting up accurate fraud detection processes has become more and more...

Published: August 7, 2014 by David Britton

Experian’s fraud prevention and identity management business helps clients combat the global fraud epidemic costing businesses hundreds of billions of dollars every year. Ori...

Published: July 25, 2014 by Matt Tatham

A recent survey reveals that 30 percent of travelers have experienced identity theft while traveling or know someone who...

Published: July 25, 2014 by Carrie Janot

Your password is weak, whether you use 40 random characters or your dog’s name. With so many large data breaches leading to hundreds of...

Published: July 24, 2014 by Mike Gross

Your password is weak, whether you use 40 random characters or your dog’s name. With so many large data breaches leading to hundreds of...

Published: July 24, 2014 by Mike Gross

Your password is weak, whether you use 40 random characters or your dog’s name. With so many large data breaches leading to hundreds of...

Published: July 24, 2014 by Mike Gross

In our most recent webinar, I had the pleasure of moderating a panel session with four fraud experts spanning across many diverse backgrounds. The...

Published: July 14, 2014 by Maria Scalone

A recent study conducted by the Ponemon Institute found that a data breach is among the top three occurrences that affect brand reputation, along...

Published: July 10, 2014 by Carrie Janot

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe