Fraud & Identity Management

Loading...

Well, in my last blog, I was half right and half wrong.  I said that individual trade associations and advocacy groups would continue to...

Published: June 3, 2010 by Keir Breitenfeld

By: Kristan Frend I recently gave a presentation on small business fraud at the annual National Association of Credit Managers (NACM) Credit Congress.  Following...

Published: June 1, 2010 by Guest Contributor

Well, here we are about two weeks from the Federal Trade Commission’s June 1, 2010 Red Flags Rule enforcement date.  While this date has...

Published: May 13, 2010 by Keir Breitenfeld

I received a call on my cell phone the other day. It was my bank calling because a transaction outside of my normal behavior pattern...

Published: April 20, 2010 by Monica Pearson

By: Ken Pruett I want to touch a bit on some of the third party fraud scenarios that are often top of mind with...

Published: April 5, 2010 by Guest Contributor

There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one negative.  Depending on the corner you...

Published: March 5, 2010 by Monica Pearson

When a client is selecting questions to use, Knowledge Based Authentication is always about the underlying data – or at least it should be. ...

Published: March 2, 2010 by Monica Pearson

My last entry covered the benefits of consortium databases and industry collaboration in general as a proven and technologically feasible method for combating fraud...

Published: February 8, 2010 by Matt Ehrlich

There was a recent discussion among members of the Anti Fraud experts group on LinkedIn regarding collaboration among financial institutions to combat fraud.  Most...

Published: February 5, 2010 by Matt Ehrlich

By: Ken Pruett I thought it might be helpful to give an example of a recent performance monitoring engagement to show just how the...

Published: January 29, 2010 by Guest Contributor

Meat and potatoes Data are the meat and potatoes of fraud detection.  You can have the brightest and most capable statistical modeling team in...

Published: January 20, 2010 by Andrew Gulledge

By: Ken Pruett The use of Knowledge Based Authentication (KBA) or out of wallet questions continues to grow. For many companies, this solution is...

Published: January 18, 2010 by Guest Contributor

Conducting a validation on historical data is a good way to evaluate fraud models; however, fraud best practices dictate that a proper validation uses...

Published: January 13, 2010 by Chris Ryan

In a previous blog, we shared ideas for expanding the “gain” to create a successful ROI to adopt new fraud best practices  to improve. ...

Published: January 11, 2010 by Chris Ryan

By definition, “Return on Investment” is simple: (The gain from an investment – The cost of the investment) _______________________________________________ The cost of the investment...

Published: January 4, 2010 by Chris Ryan

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe