How can insurers take advantage of face authentication to verify customer identity online and prevent fraud?
We've all heard gruesome stories of people hiding a corpse so they can continue to claim a friend or relative's pension. Unfortunately, deepfakes and other technology make it much easier for fraudsters to...
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
The European Union has officially proposed a strict new regulation on artificial intelligence that would ban the use of biometrics for surveillance, citing privacy concerns. The regulation would prohibit the use of facial recognition and other biometrics in public places.
How are governments using secure digital identity verification to improve the lives of citizens globally? Find out how the UK Home Office, U.S. Department of Homeland Security, Singapore Government, Australian Government, UK National Health Service (NHS) and Estonian Smart-ID are using online biometric authentication...
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
As Europe continues to debate the extent to which artificial intelligence should be allowed in public and other spaces, a draft EU regulation - leaked to a news site - shows some European lawmakers moving to restrict the use of facial recognition technology for surveillance.
For a long time now, financial industries have been known for embracing innovation to meet the ever changing consumer needs. As we move through accelerating digitization, data remains at the crux for personalized content, offers, and product recommendations. On top of this, a good digital experience which is...
Biometrics, device-based risk scoring solutions and geo location can be helpful tools for tackling ID fraud, says Trace Fooshee, senior analyst at Aite Group, who calls for a layered approach.
Investigators probing the violent storming of the U.S. Capitol by a mob on Wednesday have been seeking images and help in identifying suspects. The FBI, which is leading the investigation, has a range of investigative tools and technologies to help, including facial recognition software.
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
Fraud explodes in tough times, and do times come any tougher than they have with COVID-19? In this latest Cybersecurity Leadership panel, CEOs and CISOs describe their efforts to spot and stop emerging fraud schemes involving synthetic IDs, social engineering and greater insider risks.
As we approach 2021, the global pandemic brings a laser-focus to both risk and user experience. Digital transformation and demand for flexible, secure access drives our need for machine-scale, frictionless authentication and continuous authorization to prove digital identities match the humans behind them. Dr. Shook...
Validating identity across every digital channel is essential to track money movement information and help control P2P payment fraud, two fraud-fighting experts say.
Digital identity will be a dominant technology trend over the next decade, within the financial services industry, and more broadly in our digital economies. But banks can't take their prime position in digital identity for granted. Even in countries where banks have already driven the digital identity agenda,...
The rise of digitalization and increasing amounts of data creates both opportunity and risk for banks.
View this infographic to learn about:
The dark side of digitalization including the uptick in fraud attempts;
Providing a superior and seamless user experience with high-level security and streamlined enablement...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.