What does consent mean in ANZ?
Lawmakers around the world have placed strict rules on companies that collect and process biometric data of consumers, and the lawmakers in Australia and New … Read more
Lawmakers around the world have placed strict rules on companies that collect and process biometric data of consumers, and the lawmakers in Australia and New … Read more
As businesses accelerate their digital transformation, identity verification (IDV) has become critical for credit applications, e-commerce, and financial transactions. Yet a persistent myth remains: that … Read more
The need for stronger identity verification (IDV) has never been greater. Fraudsters are using deepfakes, synthetic identities, and stolen credentials to bypass traditional security measures. … Read more
The allure of digital IDs The evolution of a verifiable digital credential—more commonly referred to as a digital ID or a mobile driver’s license (mDL)—has … Read more
The UK Labour government has refreshed the previous government’s privacy law amendments with the Data (Use and Access) Bill. Similar to AI regulation, laws often … Read more
Is it surprising to read that there are approximately 2,200 cyberattacks per day globally? While the number of successful breaches is not increasing, some reports … Read more
Today, traditional electronic Know Your Customer (eKYC) processes are increasingly vulnerable due to widespread breaches of personally identifiable information (PII). In August 2024, a major … Read more
Identity-proofing is evolving beyond physical documents—and digital ID wallets are emerging as a convenient and secure way to store and manage our identities. As these … Read more
Following up on part 1 and part 2 in our series on AI regulation in identity verification (IDV), we turn our attention to the future. … Read more
Fake IDs aren’t just for sneaking into bars or buying alcohol anymore—they’re being used to bypass age restrictions on social media. Platforms like Instagram are … Read more
With newer, more sophisticated attack methods emerging constantly , maintaining the security of mobile communications is becoming increasingly difficult. One particularly alarming vulnerability is the … Read more
A scattered spider attack is a sophisticated cybercrime method targeting call centres through social engineering and impersonation. Attackers trick agents into revealing sensitive customer information … Read more
The importance of robust authentication cannot be overstated in today’s always-connected world. Unfortunately, many of the authentication methods we rely on daily are alarmingly vulnerable … Read more
In a startling revelation, the FBI’s 2023 Cryptocurrency Fraud Report uncovered that Americans lost over $5.6 billion to cryptocurrency scams last year. This alarming figure … Read more
In the modern digital economy, security and convenience often seem at odds, especially when it comes to user authentication. Passwords are forgotten, emails can be … Read more
Earlier this summer, I wrote about how reforms to Australian privacy laws were supposedly just around the corner. So you can imagine my anticipation when, … Read more
Strategic partnerships can unlock growth opportunities for businesses looking to enter into the burgeoning space of biometrics and identity solutions. Partnering with an AI-powered biometric … Read more
As artificial intelligence (AI) and biometric technologies continue to advance, their application in identity verification (IDV) has become increasingly sophisticated. These innovations offer unprecedented accuracy … Read more
The rise of artificial intelligence (AI) has revolutionized the field of identity verification (IDV), offering unprecedented speed, accuracy, and scalability. However, with great power comes … Read more
In the field of digital identity verification (IDV), the rise of deepfake technology has ushered in a host of new challenges and concerns. If you’re … Read more