Fraud & Identity Management

Loading...

By: Kennis Wong On the surface, it’s not difficult to define existing account fraud. Obviously, it is fraud perpetrated against an existing account. But...

Published: July 5, 2011 by Guest Contributor

The Communications Fraud Control Association’s annual meeting and educational event was held last week (June 14 – 16) at the Allerton hotel in Chicago, IL....

Published: June 22, 2011 by Matt Ehrlich

Whether you call it small business, commercial, or corporate account takeover, this form of existing account fraud has been in the headlines lately and...

Published: June 21, 2011 by Matt Ehrlich

At Experian’s recent client conference, Vision 2011, there was a refreshing amount of positive discussion and outlook on origination rates and acquisition strategies for...

Published: June 13, 2011 by Matt Ehrlich

By: Kennis Wong  Data is the very core of fraud detection. We are constantly seeking new and mining existing data sources that give us...

Published: June 3, 2011 by Guest Contributor

It’s that time of year again – when people all over the U.S. take time away from life’s daily chores and embark upon that...

Published: May 31, 2011 by Guest Contributor

By: Kennis Wong When we think about fraud prevention, naturally we think about mininizing fraud at application. We want to ensure that the identities used...

Published: May 23, 2011 by Guest Contributor

By: Kristan Frend Small business owners appear to be lucrative targets for identity fraud perpetrators, alarming banking institutions, payment processors, and B2B service providers. According to...

Published: May 16, 2011 by Guest Contributor

By: Staci Baker It seems like every time I turn on the TV there is another natural disaster. Tsunami in Japan, tornadoes and flooding in...

Published: May 6, 2011 by Guest Contributor

Last week I attended the Merchant Risk Council’s 2011 MRC Annual e-Commerce Payments & Risk Conference.  I presented a session titled “Efficiency and Empowerment...

Published: April 8, 2011 by Guest Contributor

By: Kristan Frend I was recently pleased to see that the state I reside in, Minnesota finished in the bottom third of a state ranking. ...

Published: March 30, 2011 by Guest Contributor

Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it...

Published: March 16, 2011 by Guest Contributor

Application risk management processes for deposits has remained relatively unchanged for decades. Typically, it involves credit bureau data and a secondary check of “debit bureau”...

Published: March 1, 2011 by Chris Ryan

Exciting research leveraging Experian’s fraud analytics and credit risk modeling are now enabling deposit institutions to understand the impacts of first party fraud and...

Published: February 15, 2011 by Chris Ryan

By: Kristan Frend Imagine you’re on the #1 ranked relay swim team at the World Championships and you’re leading off. You finish your leg of...

Published: February 11, 2011 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe