Tag: KBA

Loading...

Experian is recognized as a leading security solution provider for fraud and identity solutions in order to protect customers and financial...

Published: November 4, 2016 by Matt Tatham

Part 2 in our series on Insights from the Vision 2016 fraud and identity track With the growing number of data breach incidents taking...

Published: June 2, 2016 by Roger Bouvier

Increased volume of fraud attempts during back to school shopping season Back to school shopping season will be the first time many consumers’ use...

Published: August 17, 2015 by Traci Krepper

Protecting consumers from fraud this summer vacation It’s that time of year again – when people all over the U.S. take time away from life’s...

Published: August 12, 2015 by Traci Krepper

By: Maria Moynihan Cybersecurity, identity management and fraud are common and prevalent challenges across both the public sector and private sector.  Industries as diverse...

Published: May 28, 2013 by Guest Contributor

It’s that time of year again – when people all over the U.S. take time away from life’s daily chores and embark upon that...

Published: May 31, 2011 by Monica Pearson

Last week I attended the Merchant Risk Council’s 2011 MRC Annual e-Commerce Payments & Risk Conference.  I presented a session titled “Efficiency and Empowerment...

Published: April 8, 2011 by Monica Pearson

Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it...

Published: March 16, 2011 by Guest Contributor

Let’s face it – not all knowledge based authentication (KBA) is created equal. I, too, have read horror stories of consumers forced to answer questions...

Published: February 7, 2011 by Monica Pearson

Experian Decision Analytics has recorded increased demand from the marketplace for service integrations with interactive voice response (IVR), a phone technology that allows for...

Published: January 24, 2011 by Monica Pearson

By: Margarita Lim Consumer data has increasingly become commoditized over the years. There’s a lot of it and it’s arguably more easily obtainable. Social...

Published: October 13, 2010 by Guest Contributor

There are a number of people within the industry heralding the death of knowledge based authentication. To those people I would say, “In my humble...

Published: August 9, 2010 by Monica Pearson

A few days ago I saw an article about hackers working from Russia, while committing check fraud in the United States. In what those...

Published: August 9, 2010 by Monica Pearson

In “An ounce of prevention is worth a pound of cure” Kristan Frend touched on the vulnerabilities faced by members of our Armed Services....

Published: July 14, 2010 by Monica Pearson

I received a call on my cell phone the other day. It was my bank calling because a transaction outside of my normal behavior pattern...

Published: April 20, 2010 by Monica Pearson

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image