Fraud & Identity Management

Loading...

There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one negative.  Depending on the corner you...

Published: March 5, 2010 by Monica Pearson

When a client is selecting questions to use, Knowledge Based Authentication is always about the underlying data – or at least it should be. ...

Published: March 2, 2010 by Monica Pearson

My last entry covered the benefits of consortium databases and industry collaboration in general as a proven and technologically feasible method for combating fraud...

Published: February 8, 2010 by Matt Ehrlich

There was a recent discussion among members of the Anti Fraud experts group on LinkedIn regarding collaboration among financial institutions to combat fraud.  Most...

Published: February 5, 2010 by Matt Ehrlich

By: Ken Pruett I thought it might be helpful to give an example of a recent performance monitoring engagement to show just how the...

Published: January 29, 2010 by Guest Contributor

Meat and potatoes Data are the meat and potatoes of fraud detection.  You can have the brightest and most capable statistical modeling team in...

Published: January 20, 2010 by Andrew Gulledge

By: Ken Pruett The use of Knowledge Based Authentication (KBA) or out of wallet questions continues to grow. For many companies, this solution is...

Published: January 18, 2010 by Guest Contributor

Conducting a validation on historical data is a good way to evaluate fraud models; however, fraud best practices dictate that a proper validation uses...

Published: January 13, 2010 by Chris Ryan

In a previous blog, we shared ideas for expanding the “gain” to create a successful ROI to adopt new fraud best practices  to improve. ...

Published: January 11, 2010 by Chris Ryan

By definition, “Return on Investment” is simple: (The gain from an investment – The cost of the investment) _______________________________________________ The cost of the investment...

Published: January 4, 2010 by Chris Ryan

By: Heather Grover In my previous entry, I covered how fraud prevention affected the operational side of new DDA account opening. To give a...

Published: January 4, 2010 by Guest Contributor

By: Heather Grover In past client and industry talks, I’ve discussed the increasing importance of retail branches to the growth strategy of the bank....

Published: December 30, 2009 by Guest Contributor

The definition of account management authentication is:  Keep your customers happy, but don’t lose sight of fraud risks and effective tools to combat those...

Published: December 28, 2009 by Keir Breitenfeld

–by Andrew Gulledge Intelligent use of features Question ordering: You want some degree of randomization in the questions that are included for each session....

Published: December 22, 2009 by Andrew Gulledge

Account management fraud risks: I “think” I know who I’m dealing with… Risk of fraudulent account activity does not cease once an application has been...

Published: December 21, 2009 by Keir Breitenfeld

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image