Fraud & Identity Management

Loading...

–by Andrew Gulledge General configuration issues Question selection– In addition to choosing questions that generally have a high percentage correct and fraud separation, consider...

December 14, 2009 by Andrew Gulledge

–by Andrew Gulledge Where does Knowledge Based Authenticationfit into my decisioning strategy? Knowledge Based Authentication can fit into various parts of your authentication process....

December 7, 2009 by Andrew Gulledge

In my last post I discussed the problem with confusing what I would call “real” Knowledge Based Authentication (KBA) with secret questions.   However, I don’t...

November 23, 2009 by Monica Pearson

–by Andrew Gulledge Definition and examples Knowledge Based Authentication (KBA) is when you ask a consumer questions to which only they should know the...

November 23, 2009 by Andrew Gulledge

Round 1 – Pick your corner There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one...

November 16, 2009 by Monica Pearson

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

November 16, 2009 by Keir Breitenfeld

By: Kennis Wong It’s true that intent is difficult to prove. It’s also true that financial situations change. That’s why financial institutions have not,...

November 9, 2009 by Guest Contributor

On Friday, October 30th, the FTC again delayed enforcement of the “Red Flags” Rule – this time until June 1, 2010 – for financial...

November 6, 2009 by Matt Ehrlich

As I wrote in my previous posting, a key Red Flags Rule challenge facing many institutions is one that manages the number of referrals generated...

November 2, 2009 by Keir Breitenfeld

In my last entry, I talked about the challenges clients face in trying to meet multiple and complex regulatory requirements, such as FACT Act’s...

October 15, 2009 by Matt Ehrlich

While the FACT Act’s Red Flags Rule seems to capture all of the headlines these days, it’s just one of a number of compliance...

October 14, 2009 by Matt Ehrlich

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

October 13, 2009 by Keir Breitenfeld

By: Kennis Wong In Part 1 of Generic fraud score, we emphasized the importance of a risk-based approach when it comes to fraud detection....

October 12, 2009 by Guest Contributor

By: Kennis Wong In this blog entry, we have repeatedly emphasized the importance of a risk-based approach when it comes to fraud detection. Scoring and...

October 9, 2009 by Guest Contributor

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

October 9, 2009 by Keir Breitenfeld

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image