Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Bio

Keshia is a Senior Developer Evangelist at Fingerprint with over 12 years of experience helping people make sense of data and build API-driven products that developers love. She’s passionate about enabling both developers and non-developers to succeed and drive impact. Currently, she focuses on equipping developers with the tools, content, and insights they need to fight fraud. Driven by curiosity, Keshia enjoys learning new skills and finding creative ways to support others through technology. In her free time, she loves going to concerts, traveling, and working on coding side projects.

Keshia Rose Articles

Keshia Rose's Articles

vpn-detection icon
July 3, 2025

How to detect a VPN to prevent fraud in 2025

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

radar
July 2, 2025

Device Fingerprinting Guide: What It Is, How It Works + Examples

Learn how security teams use device fingerprinting to track users, uncover hidden threats, and shut down fraud before it starts.

Bot detection radar
June 28, 2025

Bot detection: How to block bad bots in 2025

Bot detection is the process of identifying and blocking automated web traffic, typically used in cybersecurity to prevent malicious activities.

How to stop guest checkout fraud blog image
June 27, 2025

Guest checkout fraud: How to stop repeat offenders

Allowing guest checkouts boosts conversion rates but also opens the door to repeated anonymous payment fraud. Learn how to detect and stop fraudsters while maintaining a seamless experience for legitimate shoppers.

Prevent NAF tutorial blog image
June 23, 2025

What is new account fraud & how to prevent it

Fake accounts are easy to create and hard to catch. Learn how new account fraud works and see exactly how to stop it with Fingerprint’s device intelligence.

Blog image for RUX fintech webinar
May 9, 2025

Webinar recap: How fintechs balance friction & security for returning users

Learn how Sokin & Banc of California enhance the returning user experience without sacrificing security.

Image for recent devices tutorial
March 31, 2025

Tutorial: Power fraud detection with real-time user insights for Recent Devices pages

Learn how to integrate Fingerprint’s device intelligence platform to create informative “recent devices” pages with real-time user insights. Step-by-step tutorial with code snippets for seamless setup.

Image for recent devices insights blog post
March 31, 2025

How to empower your users to stop account takeovers

Businesses invest heavily in account security. Discover how user-facing security insights and alerts can reinforce trust and provide an extra layer of protection by keeping users informed.

Image for gelocation regulatory compliance blog post
March 24, 2025

How to meet geolocation requirements for regulatory compliance

Complying with geographic restrictions can be a headache. Learn how device intelligence exposes location spoofing techniques, revealing users' true locations, and helps businesses meet regulatory requirements while avoiding penalties.

Stylized image for RUX tutorial
March 20, 2025

The art of recognizing return users — without relying on cookies

Recognizing returning users, even without them logging in, lets you create personalized experiences that reduce friction and enhance engagement. Learn how accurate visitor identification can make every revisit feel seamless and welcoming.

Image for regional pricing fraud prevention tutorial
February 19, 2025

Tutorial: Outsmarting VPNs — prevent regional pricing fraud with true location detection

Discover how to detect true user locations so you can prevent regional pricing fraud and ensure fair pricing, even when users have their VPNs turned on.

Keyboard image for social engineering prevention blog post
January 30, 2025

Social engineering for fintech companies: A guide to preventing attacks

Learn how fintech companies can protect against social engineering attacks, with real-world examples, prevention strategies, and code snippets.