Fraud & Identity Management

Loading...

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Published: September 30, 2009 by Keir Breitenfeld

By: Kristan Keelan Most financial institutions are well underway in complying with the FTC’s ID Theft Red Flags Rule by: 1.  Identifying covered accounts 2. ...

Published: September 29, 2009 by Guest Contributor

By: Kristan Keelan What do you think of when you hear the word “fraud”?  Someone stealing your personal identity?  Perhaps the recent news story...

Published: September 24, 2009 by Guest Contributor

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Published: September 24, 2009 by Keir Breitenfeld

By: Kennis Wong As I said in my last post, when consumers and the media talk about fraud and fraud risk, they are usually referring to...

Published: September 8, 2009 by Guest Contributor

By: Kennis Wong When consumers and the media talk about fraud and fraud risk, nine out of ten times they are referring to third-party...

Published: September 4, 2009 by Guest Contributor

By: Ken Pruett I find it interesting that the media still focuses all of their attention on identity theft when it comes to credit-related...

Published: August 30, 2009 by Guest Contributor

By: Heather Grover In my previous blog, I covered top of mind issues that our clients are challenged with related to their risk based...

Published: August 30, 2009 by Guest Contributor

— by Heather Grover I’m often asked in various industry forums to give talks about, or opinions on, the latest fraud trends and fraud...

Published: August 30, 2009 by Guest Contributor

There were always questions around the likelihood that the August 1, 2009 deadline would stick. Well, the FTC has pushed out the Red Flag...

Published: July 30, 2009 by Keir Breitenfeld

As I’ve suggested in previous postings, we’ve certainly expected more clarifying language from the Red Flags Rule drafting agencies.  Well, here is some pretty...

Published: June 12, 2009 by Keir Breitenfeld

We at Experian have been conducting a survey of visitors to our Red Flag guidelines microsite (www.experian.com/redflags). Some initial findings show that approximately 40 percent of...

Published: June 10, 2009 by Keir Breitenfeld

One of the handful of mandatory elements in the Red Flag guidelines, which focus on FACTA Sections 114 and 315, is the implementation of...

Published: May 29, 2009 by Keir Breitenfeld

What are your thoughts on the third extension to the Identity Theft Red Flags Rule deadline? Was your institution ready to meet Red Flag......

Published: May 22, 2009 by Keir Breitenfeld

Does the rule list the Red Flags? The Identity Theft Red Flags Rule provides several examples of Red Flagsin four separate categories: 1. alerts...

Published: May 15, 2009 by Keir Breitenfeld

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image