Archive

Crowdsourced Abuse Reporting

Learn More

What is Crowdsourced Abuse Reporting? Crowdsourced abuse reporting (CSAR) is where a platform includes tools for users…

What is Crowdsourced Abuse Reporting? Crowdsourced abuse reporting (CSAR) is where a platform includes tools for users to report abusive or fraudulent behavior. CSAR is a common feature of social networks and online marketplaces. It is often one of the first tools emerging social networks implement…

SR 11-7 Compliance

Learn More

SR 11-7 is a regulatory standard set out by the U.S. Federal Reserve Bank that gives guidance on model risk management.…

SR 11-7 is a regulatory standard set out by the U.S. Federal Reserve Bank that gives guidance on model risk management. The official Supervision and Regulation Letter provides general guidelines to ensure that model development approach is disciplined, knowledge-based, and properly implemented.…

Supervised Machine Learning

Learn More

Machine learning is a branch of artificial intelligence that enables algorithms to learn from existing data and then…

Machine learning is a branch of artificial intelligence that enables algorithms to learn from existing data and then apply that knowledge to new data. Supervised learning is the most common type of machine learning. It requires labeled training data, and the training goal is to be able to label…

IP Reputation Service

Learn More

An IP reputation service provides a reputation score for an individual IP address that can be used by organizations as…

An IP reputation service provides a reputation score for an individual IP address that can be used by organizations as a signal in a fraud risk scoring system. IP reputation services became a popular solution for risk scoring because they not only signal that an IP address hosts malicious content…

Email Reputation Service

Learn More

What is an Email Reputation Service? An email reputation service typically provides a risk score for an email address.…

What is an Email Reputation Service? An email reputation service typically provides a risk score for an email address. The risk score is based on attributes such as the age of the email address, email frequency, and domain. Some email reputation services also validate identities using email-based…

Two-Factor Authentication (2FA)

Learn More

What is Two-Factor Authentication (2FA)? Two-factor authentication (2FA) is a tool that organizations use to secure…

What is Two-Factor Authentication (2FA)? Two-factor authentication (2FA) is a tool that organizations use to secure online accounts; it adds a layer of security on top of a username and password. Many organizations implement 2FA to prevent account takeover (ATO) and credential stuffing. However,…

Device Fingerprinting

Learn More

What is Device Fingerprinting? Device fingerprinting is a process of collecting unique identifying information from an…

What is Device Fingerprinting? Device fingerprinting is a process of collecting unique identifying information from an electronic device. It is also variously referred to as browser or machine fingerprinting. Device fingerprinting is commonly used for identity validation, fraud prevention, and…

Unsupervised Machine Learning

Learn More

Machine learning is a branch of artificial intelligence that enables algorithms to learn from existing data and then…

Machine learning is a branch of artificial intelligence that enables algorithms to learn from existing data and then apply that knowledge to new data. Unsupervised machine learning (UML) is a major category of machine learning techniques that works without requiring labeled input data. Instead, it…