SAVE THE DATE: Fraud Prevention Summit 2024
Registration is now open for the Fraud Prevention Summit (formerly the Merchant Fraud Summit), which is taking place on November 6th
Registration is now open for the Fraud Prevention Summit (formerly the Merchant Fraud Summit), which is taking place on November 6th
Each month on Fraud Prevention Briefing we’re shining the spotlight on a different part of the market – and in February
In the UK, the landscape of digital identity verification is rapidly evolving, especially within the realms of commercial and public
Each month on Fraud Prevention Briefing we’re shining the spotlight on a different part of the market – and in January
Deep down, everyone wants to live a lavish lifestyle, right? No more worrying about money. Enjoying the finer things in
Over the last decade, the approach to chargeback solutions in the UK has seen significant evolution, driven by advancements in
From ensuring secure financial transactions to enhancing border control and streamlining retail interactions, advanced biometrics’ ability to provide robust security
Artificial intelligence (AI) is everywhere you look, and the financial services sector is no different. Banks and other financial firms
Accelerating adoption of embedded SIMs (eSIMs) is poised to reshape the cellular IoT landscape, driving growth and market disruption. As
Point of Sale (POS) verification solutions have undergone significant transformation in UK retail. For payment professionals working in this sector,
Th UK has published the first global guidelines to ensure the secure development of AI technology as part of an initiative
Registration is now open for the second annual Merchant Fraud Summit, which is taking place on November 6th 2024 at the
A Juniper Research whitepaper has revealed the 10 trends it believes are set to radically impact the fintech and payments landscape
By David Varney, Partner, and Nicole Simpson, Trainee Solicitor, Burges Salmon After almost four years of significant debate and media discussion in the
Fraudsters are employing ever more sophisticated methods to bypass traditional security measures. One such method is the use of proxies