Learning to Think Like a Fraudster | The Fraud Bible

Have you ever wondered where – and how – fraudsters learn how to do what they do best? A new publication, The Fraud Bible, is here to answer all your questions – and unfortunately share the means of becoming a criminal. From a consumer mindset, this bible will offer insight into the ways fraudsters take advantage – but from a…
November 21, 2019
A Fraudster’s Holiday | Contact Center Fraud in Retail
With the impending stresses of Black Friday, Cyber Monday, and other holiday shopping activities on the horizon, it is easy to forget to consider that…
Read More →
May 20, 2019
Authentication Myths | Our Voices Never Age
Did you know that like the rest of your body, your voice is not immune from the ravages of time? Your vocal cords lose elasticity and flexibility and can even dry out. The larynx is a muscle just like any other and can atrophy, become thinner and weaker over time. Your lung size can even decrease over time. All of…
Read More →
October 29, 2019
Up Next | ICX Atlanta
Fraudulent calls within the contact center have grown by 350% – in only five years. Starting with data collection and validation, fraudsters go through many…
Read More →
October 15, 2019
ICX Card Issuer Summit Report Out – October 2019 Chicago IL
On October 1st, a group of leading professionals from the credit card issuing industry gathered at Chicago’s Fairmont hotel to participate in a full day…
Read More →
July 26, 2019
Trends in Insurance | How Can We Prevent Fraud?
Across the board, insurers found they were experiencing a huge uptick in fraud. As insurers (and other enterprises across industries) invest in technology to prevent…
Read More →
March 8, 2019
Natural Communication | The Latest Consumer Interface
From the first computers, which quickly made their way to being a major force of communication, to the advent of smartphones, consumers have always been at the forefront of changes and arrivals of interfaces and popular technology. Computers were characterized by the creation of passwords and PINs to keep track of accounts, logins, and access to personal information. Surpassing this,…
Read More →
July 9, 2019
The Story of a Top 10 Insurance Company
In the insurance industry, many insurers run into problems with data privacy and account takeover. Fraudsters often target independent accounts from insurance agents, because that…
Read More →
June 26, 2019
AI | Infant Technology in Training
The promise of artificial intelligence is too attractive to ignore. Ideas range from discerning trends we are currently unable to see and optimizing decision making…
Read More →
May 31, 2019
Deepfakes | What You Need To Know
Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound…
Read More →
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is…
Read More →
December 10, 2018
Voice Biometrics: The ‘Thumbprint’ of the Future | Pindrop
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats