Your search for Velocity returned 10 results

How to Make the Most of Your Key Data Elements for Robust Risk Intelligence

Emailage examines six common data inputs and looks at the value they provide from a risk assessment context.

Read more »

Five Emerging eCommerce Fraud Threats and How to Stop Them

Whitepages examines key eCommerce and mobile commerce risk trends, and ways online businesses can help protect themselves.

Read more »

The Vaccination Philosophy to Fraud Management

Two industry veterans describe the concept of iatrogenics and explain why watchful waiting can be a better strategy than immediate intervention when it comes to mitigating fraud.

Read more »

Fraud in Gaming -- Disrupting the Bad in the Good

Sony Interactive Entertainment looks at common fraud patterns impacting the gaming industry and presents a framework on how to approach these threats.

Read more »

The Power in Consortium Data

Discover how a consortium approach can help merchants augment their fraud detection strategies through enhanced pattern and behavioral data.

Read more »

Fraud in Gaming -- Disrupting the Bad in the Good!

Learn about several of the unique fraud attacks specific to the gaming industry and what actions can be taken to mitigate -- and, in some cases, prevent -- them.

Read more »

Approaches and Hurdles to Machine Learning

Take an introductory look at machine learning, a powerful tool more and more companies are using to combat complex types of online fraud.

Read more »

Beyond Device ID - Using Digital Identification to Reduce Fraud

Device intelligence is an evolution of device fingerprinting and is a vital tool to detect multiple types of fraud across disparate business models.

Read more »

Lessons Learned in Preventing Fraud for a New Subscription Product at AOL

AOL learned some valuable lessons about preventing fraud following the launch of a new subscription product, and shares their findings.

Read more »

Using a Global Trust Intelligence Network to Stop Account Takeover, Payment Fraud, and Identity Spoofing

Device, identity, and behavior analytics can all be important components in assessing whether an account has been taken over.

Read more »