ClickCease

“Toughest Year in History for Retail Loss Prevention” Says Mary Ann Miller on Bloomberg Radio

What are the biggest retail fraud trends as we move into the holiday season and how does digitial identity tie in? I had the pleasure of speaking with Matt Miller and Sonali Basak of Bloomberg Radio this month to discuss how retailers can harness the power of digital identity to protect their bottom line from fraud. Tune-in to find out why I went on the record to predict that 2021 will be the hardest holiday shopping season for retailers in recent history. Believe it or not, the rise of smash-and-grab robberies is just the tip of the iceberg.


Listen to the full interview at Bloomberg.com here.


To learn about Prove’s identity solutions and how to accelerate revenue while mitigating fraud, schedule a demo today.


Keep reading

See all blogs
Read the article: Anatomy of an Account Takeover Attack: Analysis and Response Plan
Developer Blogs
Anatomy of an Account Takeover Attack: Analysis and Response Plan

Learn practical strategies for handling identity verification API errors or no-match responses. Explore fallback methods and clear communication tactics to ensure a smooth, user-friendly experience.

Developer Blogs
Read the article: Prove Global Fraud Policy℠: A New, Adaptive Standard for Digital Identity
Blog
Prove Global Fraud Policy℠: A New, Adaptive Standard for Digital Identity

Introducing the Global Fraud Policy (GFP), Prove’s new unified, adaptive fraud-defense engine that replaces fragmented, custom rules with a single, comprehensive policy that automatically updates as new threats emerge. This forward-looking framework helps businesses anticipate and respond to evolving threats like GenAI deepfakes, synthetic identities, and eSIM bots, protecting customers at scale.

Blog
Read the article: Passkey Syncing Fraud: The New Attack Vector Everyone Saw Coming
Blog
Passkey Syncing Fraud: The New Attack Vector Everyone Saw Coming

Passkey syncing, a feature meant for convenience, has created a new security threat by allowing attackers to compromise cloud accounts and download victims' passkeys. Learn how this fraud happens and the steps consumers and businesses can take to protect high-risk accounts.

Blog