Credit Lending

Loading...

By: Mike Horrocks Living just outside of Indianapolis, I can tell you that the month of May is all about “The Greatest Spectacle in...

Published: June 7, 2014 by Guest Contributor

Julie Conroy – Research Director, Aite Group Finding patterns indicative of money laundering and other financial crimes is akin to searching for a needle in...

Published: May 9, 2014 by Guest Contributor

At Experian’s 2014 Vision conference (#vision2014), Ori Eisen and Matt Ehrlich presented current trends and practices for taking on the growing industrialization of fraud.  Together with...

Published: May 8, 2014 by Matt Tatham

As we discussed in our earlier Heartbleed post, there are several new vulnerabilities online and in the mobile space increasing the challenges that security...

Published: May 5, 2014 by Matt Tatham

The discovery of Heartbleed earlier this year uncovered a large-scale threat that exploits security vulnerability in OpenSSL posing a serious security concern.This liability gave...

Published: May 2, 2014 by Matt Tatham

Both Visa and MasterCard announced their support for Host Card Emulation (HCE) and their intent to release HCE specifications soon. I have been talking...

Published: February 20, 2014 by Cherian Abraham

By: Matt Sifferlen On January 17th, we celebrated the 308th birthday of one of America’s most famous founding fathers, Ben Franklin. I’ve been a...

Published: February 10, 2014 by Guest Contributor

By: Teri Tassara In my blog last month, I covered the importance of using quality credit attributes to gain greater accuracy in risk models. ...

Published: January 10, 2014 by Guest Contributor

In the 1970s, it took an average of 18 days before a decision could be made on a credit card application. Credit decisioning has...

Published: November 4, 2013 by Cherian Abraham

By: Zach Smith On September 13, the Consumer Financial Protection Bureau (CFPB) announced final amendments to the mortgage rules that it issued earlier this year....

Published: October 18, 2013 by Guest Contributor

TL;DRRead within as to how Touch ID is made possible via ARM’s TrustZone/TEE, and why this matters in the context of the coming Apple’s...

Published: October 2, 2013 by Cherian Abraham

By: Matt Sifferlen I recently read interesting articles on the Knowledge@Wharton and CNNMoney sites covering the land grab that’s taking place among financial services startups...

Published: September 25, 2013 by Guest Contributor

By: Joel Pruis As we go through the economic seasons, we need to remember to reassess our strategy.  While we use data as the...

Published: September 16, 2013 by Guest Contributor

If you're looking to implement and deploy a knowledge-based authentication (KBA) solution in your application process for your online and mobile customer acquisition channels...

Published: September 12, 2013 by Lloyd Laudorn

There are two core fundamentals of evaluating loan loss performance to consider when generating organic portfolio growth through the setting of customer lending limits....

Published: July 8, 2013 by Andrew Beddoes

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image