Blog

Explore the news and ideas behind the technology.

By Lloyd Reeve
Synthetic Fraud: Stop, Remediate & Listen
Synthetic identity fraud has recently emerged as a critical threat, particularly in the realms of document forgery and liveness deception. In fact, over the last ... Read more
By Josh Read
The Role of Digital IDV in Meeting Australia’s New AML/CTF Standards
The AML/CTF Amendment Bill 2024 has officially passed both the Australian House of Representatives and Senate, marking a pivotal moment in the nation’s efforts to ... Read more
By Peter Violaris
Australia's New AML Laws: No More Simple Electronic KYC
The current landscape Australia took large strides last week to become world leaders in Know Your Customer (KYC) requirements when doing your Anti-Money Laundering (AML) ... Read more
By Terry Brenner, LLM
A Thanksgiving Reflection: The Evolution of Identity
Your name in clay Kushim: supposedly the earliest recorded name of a person in writing (c. 3400-3000 BCE). Found on clay tablets in Sumer, Mesopotamia. ... Read more
By Josh Read
Australia Leads the Way: Protecting Children in the Digital Age
In a significant move toward digital child protection, Australia is set to introduce legislation that restricts social media access for minor users under 16 years ... Read more
By Peter Violaris
What the UK Data Bill Means for Identity Verification
The UK Labour government has refreshed the previous government’s privacy law amendments with the Data (Use and Access) Bill. Similar to AI regulation, laws often ... Read more
By Emily Hendley
The Art of Prioritization: 6 Steps to Deciding Which Features to Develop
Building a successful identity verification (IDV) solution is as much about what you choose not to do as it is about what you decide to ... Read more
By Terry Brenner, LLM
A Fortress Against Fraud: Privacy-First AI & Enhanced Trust in ID Verification
Is it surprising to read that there are approximately 2,200 cyberattacks per day globally? While the number of successful breaches is not increasing, some reports ... Read more
By Jarrod Basger
The Return on Identity™ (ROI) Framework: Quantifying the Value of Identity Verification
Identity verification (IDV) is crucial for modern businesses—yet many organizations struggle to measure its impact accurately. Some are unaware of the full costs involved.  To ... Read more
By Josh Read
The Future of eKYC: Combatting PII Breaches & Deepfakes
Today, traditional electronic Know Your Customer (eKYC) processes are increasingly vulnerable due to widespread breaches of personally identifiable information (PII). In August 2024, a major ... Read more
By Matt Ingman
Executing Genuine Identity Onboarding In Digital Wallets
Identity-proofing is evolving beyond physical documents—and digital ID wallets are emerging as a convenient and secure way to store and manage our identities. As these ... Read more
By Josh Read
Why Perpetual KYC is Key to Modern AML/CTF Compliance
In the modern regulated financial environment, banks face significant responsibilities when it comes to Know Your Customer (KYC) processes, Anti-Money Laundering (AML) protocols, Counter-Terrorism Financing ... Read more
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security