Recent posts
Five Ways Fraudsters Spoof Location
Location spoofing is now a standard technique used by...
How should location fit into a risk based authentication strategy?
How to implement frictionless risk based authentication...
Account Takeover Prevention Using Location Behavior
Strong Account Takeover Prevention could be achieved...
Incognia: A Great Place to Work
Incognia was recently certified as a great place to work by...
Real-time address verification for mobile
With increasing mobile adoption, use of real-time address...
Global QSR Approves More Mobile Transactions with Incognia
Incognia dramatically increases approval rates for mobile...