verification
Protecting the Future of Digital Identities
In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...
The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History
Former Twitter users are migrating en masse to Mastodon so what is Mastodon and what do you need to know about Mastodon from a security and privacy perspective? Twitter was flooded by ...
Authentication, Identity Verification, and Identification: What’s the Difference
People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...
Solving the Puzzle of Global Identity Verification
With customer bases that span the globe and the growing prevalence of online fraud, financial service providers know that effective identity verification (IDV) is imperative. But meeting anti-money laundering (AML) and know ...
The Human Touch in Identity Verification
Businesses and consumers alike are growing more dependent on AI every day. The technology serves as the foundation of almost every digital assistant, search engine, online shopping recommendation or automated technology we ...
Identity Verification: Is Your Potential Employee Who They Say They Are?
Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Cybersecurity Lessons from the Pandemic: Data – Part 1
The collection and reporting of data relating to the coronavirus pandemic and related medical research and practices are in a shambles. For example, a June 7, 2020 article by Jason Slotkin cites ...
Keeping Systems Safe From Third Parties
Vendors. Supply chain partners. Third parties. Contractors. All are different names for entities that might need access to your corporate networks and systems. But they have one important thing in common: They ...
Zero Trust – The new default for Information Security
When it comes to granting access to confidential data at work who can really be trusted? With a Zero Trust mindset the answer should be no one at all ...
Spam Bots and Fake Accounts: Helping Solve the Security Identity Crisis
Despite how it sounds, in today’s age of fake news and fake accounts, websites that collect more identifiable information about their users are better-positioned to protect identities and even solve the widespread ...