Fraud & Identity Management

Loading...

Part four in our series on Insights from Vision 2016 fraud and identity track It was a true honor to present alongside Experian fraud...

Published: June 14, 2016 by Kyle Hinsz

Part 3 in our series on Insights from the Vision 2016 fraud and identity track Our Vision 2016 fraud track session titled “Deployment Made Easy...

Published: June 7, 2016 by Chris Ryan

Part 2 in our series on Insights from the Vision 2016 fraud and identity track With the growing number of data breach incidents taking...

Published: June 2, 2016 by Roger Bouvier

Industry’s first smart plug-and-play fraud platform allows companies to connect their own solutions, Experian products and third-party vendors in one place to better protect...

Published: June 1, 2016 by Matt Tatham

Last week we had the pleasure of joining more than 400 clients at the 35th annual Vision Conference — connecting business leaders to ideas...

Published: May 25, 2016 by Mike Gross

False declines are often unwarranted and occur due to lack of customer information Have you ever been shopping online, excited to get your hands...

Published: May 18, 2016 by Mike Gross

Adam Fingersh, senior vice president and general manager of Experian’s fraud and identity business, shared several fraud prevention strategies that businesses and consumers can...

Published: May 18, 2016 by Adam Fingersh

James W. Paulsen, Chief Investment Strategist for Wells Capital Management, kicked off the second day of Experian’s Vision 2016, sharing his perspective on the...

Published: May 17, 2016 by Traci Krepper

It’s impossible to capture all of the insights and learnings of 36 breakout sessions and several keynote addresses in one post, but let’s summarize...

Published: May 16, 2016 by Kerry Rivera

This article first appeared in Baseline Magazine Since it is possible for cyber-criminals to create a synthetic person, businesses must be able to differentiate...

Published: May 10, 2016 by Guest Contributor

A recent Experian study reveals that tax filing, document collection and refund processing are done online more often, yet only 6% of consumers file...

Published: April 14, 2016 by Carrie Janot

Device emulators — wolves in sheep’s clothing Despite all the fraud prevention systems and resources in the public and private sectors, online fraud continues...

Published: April 11, 2016 by Mike Gross

Identity management traditionally has been made up of creating rigid verification processes that are applied to any access scenario. But the market is evolving...

Published: March 16, 2016 by Kolin Whitley

Top states for billing and shipping e-commerce fraud With more than 13 million fraud victims in 2015, assessing where fraud occurs is an important...

Published: March 10, 2016 by Carrie Janot

Proven identity and device authentication to minimize identity tax return fraud Identity fraud places an enormous burden on its victims and presents a challenge...

Published: March 10, 2016 by Traci Krepper

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image