fraud triangle

What You Need to Know About the Fraud Triangle

Use the Fraud Triangle, developed by sociologist Donald R. Cressey, to spot and…


Invoice Fraud and Business Email Compromise (BEC)

6 Actions to Shield your Company from Invoice and Payment Fraud

Reducing Invoice Fraud requires a strong shield With invoice and payment fraud…


KYC AML Compliance

Top 6 Reasons You Need a Robust AI-Powered KYC AML Compliance Program

While complying with regulations is never the highest of your priorities, how…


Certified Fraud Examiners

Top 3 Skills of Certified Fraud Examiners

There is a human element to fraud prevention that can't (yet) be replaced with…


Covid Fraud

Top Six Fraud Prevention Technologies and Tactics to Tackle Fraud in 2021

The growing sophistication and menace of fraud perpetrators mean you can no…


social engineering fraud

Social Engineering Fraud - What It Is and How to Fight It

Social engineering has been on the rise since the pandemic started. Get ahead…


Using Artificial Intelligence to Fight Crime

Artificial intelligence (AI) is having quite the moment. Think-pieces around…


what is insider fraud

Insider Fraud: What it is and How to Stop It

What is Insider Fraud? An Amazon selling support associate was recently…


recent insider threat cases

Recent Insider Threat Cases: Examples You Can Learn From

What is Considered an Insider Threat? Insider threats are more destructive than…


Whitney Anderson, fraud prevention CEO

The Venture Center Speaks with Whitney Anderson

The Origins of a Fraud Prevention Company Having 25 years of banking,…