Public Sector

Public Sector

Loading...

New industry report highlights the convergence of business growth and fraud prevention strategies Experian has published its first annual global fraud report covering the...

Published: July 20, 2016 by Traci Krepper

Part four in our series on Insights from Vision 2016 fraud and identity track It was a true honor to present alongside Experian fraud...

Published: June 14, 2016 by Kyle Hinsz

Part 3 in our series on Insights from the Vision 2016 fraud and identity track Our Vision 2016 fraud track session titled “Deployment Made Easy...

Published: June 7, 2016 by Chris Ryan

Industry’s first smart plug-and-play fraud platform allows companies to connect their own solutions, Experian products and third-party vendors in one place to better protect...

Published: June 1, 2016 by Matt Tatham

James W. Paulsen, Chief Investment Strategist for Wells Capital Management, kicked off the second day of Experian’s Vision 2016, sharing his perspective on the...

Published: May 17, 2016 by Traci Krepper

It’s impossible to capture all of the insights and learnings of 36 breakout sessions and several keynote addresses in one post, but let’s summarize...

Published: May 16, 2016 by Kerry Rivera

With Military Appreciation Month celebrated in May, what better time for financial institutions to refresh their best practices in protecting and serving military credit...

Published: May 2, 2016 by Kerry Rivera

Ensuring the quality of reported consumer credit data is a top priority for regulators, credit bureaus and consumers, and has increasingly become a frequent...

Published: April 14, 2016 by Ashley Knight

Identity management traditionally has been made up of creating rigid verification processes that are applied to any access scenario. But the market is evolving...

Published: March 16, 2016 by Kolin Whitley

Understanding and managing first party fraud Background/Definitions Wherever merchants, lenders, service providers, government agencies or other organizations offer goods, services or anything of value...

Published: October 16, 2015 by Chris Ryan

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...

Published: August 1, 2015 by Maria Scalone

Tax return fraud: Using 3rd party data and analytics to stay one step ahead of fraudsters By Neli Coleman According to a May 2014...

Published: April 9, 2015 by Neli Coleman

By: Barbara Rivera Every day, 2.5 quintillion bytes of data are created – in fact, 90% of the world’s data was created in only...

Published: February 25, 2015 by Guest Contributor

More than 10 years ago I spoke about a trend at the time towards an underutilization of the information being managed by companies. I...

Published: October 21, 2014 by Charles Chung

By: Maria Moynihan Mobile devices are everywhere, and landlines and computer desktops are becoming things of the past. A recent American Marketing Association post...

Published: October 16, 2014 by Guest Contributor

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image