The Role of Digital IDV in Meeting Australia’s New AML/CTF Standards
The AML/CTF Amendment Bill 2024 has officially passed both the Australian House of Representatives and Senate, marking a pivotal moment in the nation’s efforts to … Read more
The AML/CTF Amendment Bill 2024 has officially passed both the Australian House of Representatives and Senate, marking a pivotal moment in the nation’s efforts to … Read more
The current landscape Australia took large strides last week to become world leaders in Know Your Customer (KYC) requirements when doing your Anti-Money Laundering (AML) … Read more
Your name in clay Kushim: supposedly the earliest recorded name of a person in writing (c. 3400-3000 BCE). Found on clay tablets in Sumer, Mesopotamia. … Read more
In a significant move toward digital child protection, Australia is set to introduce legislation that restricts social media access for minor users under 16 years … Read more
The UK Labour government has refreshed the previous government’s privacy law amendments with the Data (Use and Access) Bill. Similar to AI regulation, laws often … Read more
Building a successful identity verification (IDV) solution is as much about what you choose not to do as it is about what you decide to … Read more
Is it surprising to read that there are approximately 2,200 cyberattacks per day globally? While the number of successful breaches is not increasing, some reports … Read more
Identity verification (IDV) is crucial for modern businesses—yet many organizations struggle to measure its impact accurately. Some are unaware of the full costs involved. To … Read more
Today, traditional electronic Know Your Customer (eKYC) processes are increasingly vulnerable due to widespread breaches of personally identifiable information (PII). In August 2024, a major … Read more
Identity-proofing is evolving beyond physical documents—and digital ID wallets are emerging as a convenient and secure way to store and manage our identities. As these … Read more
In the modern regulated financial environment, banks face significant responsibilities when it comes to Know Your Customer (KYC) processes, Anti-Money Laundering (AML) protocols, Counter-Terrorism Financing … Read more
Following up on part 1 and part 2 in our series on AI regulation in identity verification (IDV), we turn our attention to the future. … Read more
Fake IDs aren’t just for sneaking into bars or buying alcohol anymore—they’re being used to bypass age restrictions on social media. Platforms like Instagram are … Read more
With newer, more sophisticated attack methods emerging constantly , maintaining the security of mobile communications is becoming increasingly difficult. One particularly alarming vulnerability is the … Read more
This blog will end with a simple “yes” or “no” question. On October 10, 2024, the Financial Crimes Enforcement Network (FinCEN) announced a record-breaking $1.3 … Read more
A scattered spider attack is a sophisticated cybercrime method targeting call centres through social engineering and impersonation. Attackers trick agents into revealing sensitive customer information … Read more
The importance of robust authentication cannot be overstated in today’s always-connected world. Unfortunately, many of the authentication methods we rely on daily are alarmingly vulnerable … Read more
It’s safe to say that the customer support industry—also referred to as customer success—has undergone a significant transformation with the advent of generative AI (GenAI). … Read more
In a startling revelation, the FBI’s 2023 Cryptocurrency Fraud Report uncovered that Americans lost over $5.6 billion to cryptocurrency scams last year. This alarming figure … Read more
In the modern digital economy, security and convenience often seem at odds, especially when it comes to user authentication. Passwords are forgotten, emails can be … Read more