Tag: KBA

Loading...

There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one negative.  Depending on the corner you...

Published: March 5, 2010 by Monica Pearson

When a client is selecting questions to use, Knowledge Based Authentication is always about the underlying data – or at least it should be. ...

Published: March 2, 2010 by Monica Pearson

By: Ken Pruett The use of Knowledge Based Authentication (KBA) or out of wallet questions continues to grow. For many companies, this solution is...

Published: January 18, 2010 by Guest Contributor

The definition of account management authentication is:  Keep your customers happy, but don’t lose sight of fraud risks and effective tools to combat those...

Published: December 28, 2009 by Keir Breitenfeld

–by Andrew Gulledge Intelligent use of features Question ordering: You want some degree of randomization in the questions that are included for each session....

Published: December 22, 2009 by Andrew Gulledge

–by Andrew Gulledge General configuration issues Question selection– In addition to choosing questions that generally have a high percentage correct and fraud separation, consider...

Published: December 14, 2009 by Andrew Gulledge

I have already commented on “secret questions” as the root of all evil when considering tools to reduce identity theft and minimize fraud losses. ...

Published: December 7, 2009 by Monica Pearson

–by Andrew Gulledge Where does Knowledge Based Authenticationfit into my decisioning strategy? Knowledge Based Authentication can fit into various parts of your authentication process....

Published: December 7, 2009 by Andrew Gulledge

In my last post I discussed the problem with confusing what I would call “real” Knowledge Based Authentication (KBA) with secret questions.   However, I don’t...

Published: November 23, 2009 by Monica Pearson

–by Andrew Gulledge Definition and examples Knowledge Based Authentication (KBA) is when you ask a consumer questions to which only they should know the...

Published: November 23, 2009 by Andrew Gulledge

Round 1 – Pick your corner There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one...

Published: November 16, 2009 by Monica Pearson

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image