Blog

out of wallet questions

Successful, Dynamic KBA – Applying the Right Identity Verification Method at the Right Time

There are several means of proofing identities during digital interactions, and there is often not....

Protect Your Customers from Rising Identity Theft Threats

Identity theft, as defined by Wikipedia as “a form of stealing someone’s identity in which someone pretends....

The Expanding Under and Unbanked Market – How to Verify Thin Files

What is a thin file? A thin file is basically just that – the “file”....

Most Effective Use of Identity Verification in a Call Center Environment

Identity verification solutions are just as important in a call-center environment as they are online.....

How do Risk Managers Utilize Identity Verification?

Organizations have long followed a variety of risk management practices in order to keep costs....

The Triple Threat for Fraud: Stalking, Social Networking & Shared Secrets

Banks might not need as much convincing that challenge questions based on shared secrets aren’t....

An Out-of-Wallet Rose by Any Other Name…

I want to help clear up some confusion in the market about the updated FFIEC....

Finally…FFIEC Guidelines Update Is Issued

After almost 6 months the long anticipated FFIEC guidelines update has been issued. And as....

Will the new FFIEC guidelines do away with Shared Secrets?

Let’s hope so.  For awhile this blog has relayed the dangers of using shared secret....

WEBINAR

BALANCING FRICTION AND FRAUD: Insights from the 2nd Annual Consumer Digital Identity Study

Featuring Christina Luttrell and Eric Leiserson as presenters

May 23 at 2:00pm EDT

NEW RESEARCH

study cover image

SECOND ANNUAL CONSUMER DIGITAL IDENTITY STUDY