Recent posts

Solving the digital identity problem for mobile and beyond
Digital identity is a challenging problem and far from...

Why Location is Hard to Get Right
Applying location technology to mobile fraud prevention is...

Why Precise Location Matters for Mobile Fraud Prevention
With 50% of transactions happening on mobile devices, and...

Five Ways Fraudsters Spoof Location
Location spoofing is now a standard technique used by...

How should location fit into a risk based authentication strategy?
How to implement frictionless risk based authentication...

Account Takeover Prevention Using Location Behavior
Strong Account Takeover Prevention could be achieved...