SAS Manages an Analytics Hub of Internal, 3rd Party, and AI Data for Telco-Specific, Holistic Fraud Solutions

March 2020

SAS Manages an Analytics Hub of Internal, 3rd Party, and AI Data for Telco-Specific, Holistic Fraud Solutions

interview with Sundeep Tengur

A leading cross-industry fraud analytics firm provides: a picture of telecom threats; perspective on subscription and onboarding fraud; parallels to fraud control in banking; and a rundown on its telco-specific approach to solving fraud problems in a holistic way.

Black Swan Solution Guide: Getting Porting History & Carrier Data to Verify Identity & Mitigate Account Takeovers

March 2020

Black Swan Solution Guide: Getting Porting History & Carrier Data to Verify Identity & Mitigate Account Takeovers

by Kathy Timko

Learn about a recently approved risk intelligence service to receive authoritative and real-time notices of numbers being ported and changes to the carrier-of-record for specific telephone numbers.

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses

February 2020

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses

interview with Jason Lane-Sellers

An partner-network enabled identity  verification system is used by some of the largest financial and e-commerce firms in the world.  Learn how this new paradigm may revolutionize current identity and fraud control operations.

Lanck Telecom Raises Fraud Alarm for International Brands, Enterprise Call Centers & Carriers: Beware of Wangiri 2.0

December 2019

Lanck Telecom Raises Fraud Alarm for International Brands, Enterprise Call Centers & Carriers: Beware of Wangiri 2.0

interview with Sergey Okhrimenko

An international wholesaler gives details about a new traffic pumping fraud dubbed Wangiri 2.0.  The fraud is hard to detect and targets businesses who do lots of international calling.

A Black Swan Solution Guide: The Value of an Authoritative Database of Global Telephone Numbers in Fraud Control

December 2019

A Black Swan Solution Guide: The Value of an Authoritative Database of Global Telephone Numbers in Fraud Control

interview with John Haraburda

Learn about an authoritative database of allocated numbers and special number ranges in every country of the world.  The expert explains how this database adds value to any FMS or fraud analyst team.

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers

October 2019

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers

interview with Kathy Timko

Matching the porting history of a telephone number to a carrier of record is now crucial to identity/credit checks by financial, healthcare, and other firms in the U.S. Learn how fraudsters exploit carrier porting processes to perform account takeover in 10 minutes; and why freshly updated porting data is needed to combat $17 billion in identity fraud.

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight

October 2019

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight

interview with Miguel Carrero

Security-breach-driven fraud is on the increase as fraudsters gain deeper  knowledge of telecom spheres such as roaming.  Using five fraud cases, an expert shows how advanced signaling techniques are taking fraud control to a higher level.

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control

September 2019

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control

interview with Dan Baker & Colin Yates

The IPRN Database is a powerful new tool for helping control IRSF and Wangiri frauds.  The pioneer of the category explains the value and use of the IPRN Database in this 14-page Black Swan Solution Guide.

Tethering Fraud: How Guavus Blocks the Pumping of Mobile Data Traffic and Tools Up to Deliver 5G Service Management

August 2019

Tethering Fraud: How Guavus Blocks the Pumping of Mobile Data Traffic and Tools Up to Deliver 5G Service Management

interview with Kent McIntosh & David Yates

How is analytics being applied to next generation data threats?  Learn how tethering fraud occurs and is detected.  Also discussed are: data volume reduction at the network edge, IoT fraud concerns, and automating the healing of high-quality 5G data services.

How GBSD Enables Advanced and Flexible Real-Time Fraud Blocking with its High-Trust, Mobile-Network-Embedded Softswitch

August 2019

How GBSD Enables Advanced and Flexible Real-Time Fraud Blocking with its High-Trust, Mobile-Network-Embedded Softswitch

interview with Jeffrey Ross

Learn about a close-to-the-network platform that blocks mobile fruad, Reading a variety of protocols and integrated with external applications, it’s being used to combat: Wangiri, IRSF, SIM box bypass, and mobile money fraud.

More Stories in Index

Recent Articles