Fraud & Identity Management

Loading...

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Published: October 13, 2009 by Keir Breitenfeld

By: Kennis Wong In Part 1 of Generic fraud score, we emphasized the importance of a risk-based approach when it comes to fraud detection....

Published: October 12, 2009 by Guest Contributor

By: Kennis Wong In this blog entry, we have repeatedly emphasized the importance of a risk-based approach when it comes to fraud detection. Scoring and...

Published: October 9, 2009 by Guest Contributor

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

Published: October 9, 2009 by Keir Breitenfeld

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Published: September 30, 2009 by Keir Breitenfeld

By: Kristan Keelan Most financial institutions are well underway in complying with the FTC’s ID Theft Red Flags Rule by: 1.  Identifying covered accounts 2. ...

Published: September 29, 2009 by Guest Contributor

By: Kristan Keelan What do you think of when you hear the word “fraud”?  Someone stealing your personal identity?  Perhaps the recent news story...

Published: September 24, 2009 by Guest Contributor

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Published: September 24, 2009 by Keir Breitenfeld

By: Kennis Wong As I said in my last post, when consumers and the media talk about fraud and fraud risk, they are usually referring to...

Published: September 8, 2009 by Guest Contributor

By: Kennis Wong When consumers and the media talk about fraud and fraud risk, nine out of ten times they are referring to third-party...

Published: September 4, 2009 by Guest Contributor

By: Ken Pruett I find it interesting that the media still focuses all of their attention on identity theft when it comes to credit-related...

Published: August 30, 2009 by Guest Contributor

By: Heather Grover In my previous blog, I covered top of mind issues that our clients are challenged with related to their risk based...

Published: August 30, 2009 by Guest Contributor

— by Heather Grover I’m often asked in various industry forums to give talks about, or opinions on, the latest fraud trends and fraud...

Published: August 30, 2009 by Guest Contributor

There were always questions around the likelihood that the August 1, 2009 deadline would stick. Well, the FTC has pushed out the Red Flag...

Published: July 30, 2009 by Keir Breitenfeld

As I’ve suggested in previous postings, we’ve certainly expected more clarifying language from the Red Flags Rule drafting agencies.  Well, here is some pretty...

Published: June 12, 2009 by Keir Breitenfeld

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe