By: Mike Horrocks I am at the Risk Management Association’s annual conference in DC and I feel like I am back to where my...
The ubiquity of mobile devices provides financial services marketers with an effective way to distribute targeted, customized messages that appeal to a single shopper...
By: Joel Pruis I have just completed the first of two presentations on Model Risk Governance at the RMA Annual Conference. The focus of...
Experian hosted the Future of Fraud event this week in New York City where Ori Eisen and Frank Abagnale hosted clients and prospects highlighting...
More than 10 years ago I spoke about a trend at the time towards an underutilization of the information being managed by companies. I...
If rumors hold true, Apple Pay will launch in a week.Fiveofmylastsixposts had covered Apple’s likely and actual strategy in payments & commerce, and the...
By: Joel Pruis When the OCC put forth the supervisory guidance on model risk governance the big focus in the industry was around the...
Card-to-card balance transfers represent a substantial profit opportunity for...
By: Maria Moynihan Mobile devices are everywhere, and landlines and computer desktops are becoming things of the past. A recent American Marketing Association post...
According to a recent 41st Parameter® study, 85 percent of consumers use online or mobile channels to conduct...
In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...
Auto loan originations reached $153 billion in Q2 2014, which was a 16 percent increase over the same quarter last year. While the largest...
Our second annual data breach preparedness study,Is Your Company Ready for a Big Breach?, conducted by the Ponemon Institute, reveals good news and bad...
According to a recent Experian Data Quality study, three out of four organizations personalize their marketing messages or are in the process of doing......
Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....