Whitepapers
The Evolution of Fraud in the Insurance Industry
Take an inside look at the unique challenges and fraud patterns impacting insurers in this paper from iovation.
Global Fraud Attack Index Q1 2016
Forter, in conjunction with PYMNTS.com, published an updated version of their index metric which measures how the rate of fraud attempts on U.S. online merchants has changed over time.
Making Decentralized MFA Operational and Scalable - Protecting Businesses and Consumers from Cybercrime
As a solution to the inherent insecurity of passwords as an authentication method, iovation discusses their LaunchKey Auth Platform, a decentralized multi-factor authentication and real-time authorization platform.
Cross-Border Payments: Opportunities and Best Practices For Going Global
Cross-border payments can play a critical role in determining whether merchants are successful in expanding their presence in international markets.
Top Ten Success Factors for Implementing a Wallet Solution
Worldline shares ten issues merchants should consider when building and launching an online wallet.
Augmenting 3D Secure with Comprehensive Controls for Fraud Prevention
Accertify shares recommendations on using 3D Secure as part of an overall risk mitigation strategy.
How Do You Protect and Grow Your Profits?
Accertify looks at how businesses can invest in fraud prevention and in turn help increase the bottom line.
Machine Learning: The Secret Ingredient for Detecting and Preventing Fraud
Simility's Chief Technology Officer shares insights on how machine learning can be beneficial to eCommerce companies and why this technology is playing an increasingly important role in fraud detection and mitigation.
Future of Device Fingerprinting
Simility discusses recent innovations to enhance the efficacy of device fingerprinting and several use cases where this technology can help uncover fraud and abuse.
Online Marketplace Fraud
Simility explores common fraud patterns targeting online marketplaces and details three ways in which companies can better identify suspect users and transactions.