Fraud & Identity Management

Loading...

— by, Andrew Gulledge The intelligent use of question weighting in KBA should be a no-brainer for anyone using out of wallet questions. Here’s...

Published: October 19, 2010 by Andrew Gulledge

By: Margarita Lim You may be surprised to learn that identity theft isn’t just a crime committed by an individual or individuals. There are...

Published: October 18, 2010 by Guest Contributor

By: Margarita Lim Consumer data has increasingly become commoditized over the years. There’s a lot of it and it’s arguably more easily obtainable. Social...

Published: October 13, 2010 by Guest Contributor

By: Kenneth Pruett I really thought I was going to be on easy street after receiving two emails in less than a week. The...

Published: October 7, 2010 by Guest Contributor

In my last entry I mentioned how we’re working with more and more clients that are ramping up their fraud and compliance processes to...

Published: September 24, 2010 by Matt Ehrlich

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

Published: September 20, 2010 by Matt Ehrlich

Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress,...

Published: September 16, 2010 by Monica Pearson

Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...

Published: September 10, 2010 by Matt Ehrlich

Working with clients in the financial sector means keeping an eye toward compliance and regulations like the Gramm-Leach-Bliley Act (GLB), the Fair Credit Reporting...

Published: September 10, 2010 by Monica Pearson

Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...

Published: September 10, 2010 by Matt Ehrlich

Ah…the summer vacation. I’ve just returned from mine and it got me wondering, “Do fraudsters take a vacation?” You know they must. Probably somewhere...

Published: September 8, 2010 by Matt Ehrlich

By: Kennis Wong   In the last post, I emphasized the importance of fraud detection even after an account has been approved. If information...

Published: September 2, 2010 by Guest Contributor

By: Kennis Wong Most lenders authenticate applicants before they extend credit. With identity theft so prevalent today, not ensuring you are dealing with the real...

Published: August 31, 2010 by Guest Contributor

By: Kristan Frend It seems as though desperate times call for desperate measures- with revenues down and business loans tougher than ever to get, “shelf”...

Published: August 27, 2010 by Guest Contributor

The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...

Published: August 23, 2010 by Keir Breitenfeld

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image