Travel

Loading...

This article first appeared in Baseline Magazine Since it is possible for cyber-criminals to create a synthetic person, businesses must be able to differentiate...

Published: May 10, 2016 by Guest Contributor

Identity management traditionally has been made up of creating rigid verification processes that are applied to any access scenario. But the market is evolving...

Published: March 16, 2016 by Kolin Whitley

2015 data shows where billing and shipping e-commerce fraud attacks occur in the United States Experian e-commerce fraud attacks and rankings now available Does...

Published: March 2, 2016 by Matt Tatham

Loyalty fraud and the customer experience Criminals continue to amaze me. Not surprise me, but amaze me with their ingenuity. I previously wrote about...

Published: February 22, 2016 by Bill Sallurday

What is blockchain? Blockchain is beginning to get a lot of attention, so I thought it might be time to figure out what it...

Published: January 31, 2016 by Monica Pearson

Ensure you’re protecting consumer data privacy Data Privacy Day is a good reminder for consumers to take steps to protect their privacy online —...

Published: January 28, 2016 by Traci Krepper

Looking at true fraud rate I’ve talked with many companies over the years about their fraud problems. Most have a genuine desire to operate...

Published: January 11, 2016 by Bill Sallurday

Leveraging customer intelligence in the age of mass data compromise Hardly a week goes by without the media reporting a large-scale hack of sensitive...

Published: December 16, 2015 by Traci Krepper

Profile of an online fraudster I recently read a study about the profile of a cybercriminal. While I appreciate the study itself, one thing...

Published: November 25, 2015 by David Britton

What the EMV Shift means for you I recently facilitated a Webinar looking at myths and truths in the market regarding the EMV liability...

Published: November 16, 2015 by Keir Breitenfeld

While walking through a toy store in search of the perfect gift for a nephew, I noticed the board game Risk, which touts itself...

Published: November 6, 2015 by Bill Sallurday

What will the EMV shift really mean for consumers and businesses here in the U.S.? Businesses and consumers across the U.S. are still adjusting...

Published: October 27, 2015 by Keir Breitenfeld

Understanding and managing first party fraud Background/Definitions Wherever merchants, lenders, service providers, government agencies or other organizations offer goods, services or anything of value...

Published: October 16, 2015 by Chris Ryan

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...

Published: August 1, 2015 by Maria Scalone

Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...

Published: March 26, 2015 by Angela Montoya

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image