Ecommerce / Retail

Loading...

Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...

Published : March 26, 2015 by Angela Montoya

Gift card fraud Gift cards have risen in popularity over the last few years— National Retail Federation anticipated more than $31B in gift card...

Published : March 5, 2015 by Angela Montoya

The evolution of identity verification Knowing who you are doing business with isn’t just a sound business practice to protect your bottom line. In...

Published : February 17, 2015 by Matt Tatham

The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...

Published : February 11, 2015 by Guest Contributor

In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...

Published : October 3, 2014 by Maria Scalone

Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....

Published : September 29, 2014 by Maria Scalone

Online crooks are getting more sophisticated by the second. Nowadays, fraudsters have the ability to conduct “clean fraud,” obtaining legitimate identities of users from...

Published : August 8, 2014 by Maria Scalone

Surag Patel, vice president of global product management for 41st Parameter, led a panel discussion on Digital Consumer Trust with experts from the merchant...

Published : May 22, 2014 by Maria Scalone

As we prepare to attend next week’s FS-ISAC & BITS Summit we know that the financial services industry is abuzz about massive losses from the...

Published : April 23, 2013 by Mike Gross

By: Kennis Wong On the surface, it’s not difficult to define existing account fraud. Obviously, it is fraud perpetrated against an existing account. But...

Published : July 5, 2011 by Guest Contributor

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

Published : September 20, 2010 by Matt Ehrlich

The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...

Published : August 23, 2010 by Keir Breitenfeld

By: Kristan Frend I recently gave a presentation on small business fraud at the annual National Association of Credit Managers (NACM) Credit Congress.  Following...

Published : June 1, 2010 by Guest Contributor

— by Heather Grover I’m often asked in various industry forums to give talks about, or opinions on, the latest fraud trends and fraud...

Published : August 30, 2009 by Guest Contributor

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image