Category: security

Consumer Centric Identity

Deepfake fraud: protecting businesses with orchestrated identity verification

Discover how deepfake technology is revolutionizing synthetic identity fraud, costing businesses billions. Learn how to protect your business from deepfake fraud. #DeepfakeFraud #IdentityVerification #AIFraud

Is open banking data enough to verify citizens?

Discover the role of open banking in citizen verification and identity assurance. Learn how it provides a starting point for secure transactions and enhances data checks.

Identifying people in 2024 needs system thinking

Discover the complexities of the identity space and the concept of “identifying journeys” as a new approach to building more inclusive digital services in 2024.

How an Open Loop Identity Network Can Harden VRPs Against Fraud

When a new technology or process appears, you need something distinct, uncomplicated, and beneficial to prove the point. Open banking is an example of a disruptive force that looks set to shake up incumbent systems such as direct debits; Juniper Research expects open banking to handle more than $116 billion in global payment transactions by 2026. Variable Recurring Payments…
Read more

The case for an open loop identity system

Lessons for identity from real-time payments and mobile wallets Ask anyone in the digital identity world, and invariably they will say that identifying someone to do a transaction is complicated. Anyone who thinks you can present a mobile wallet and bingo, you are verified to transact, is the equivalent of saying a swan glides but…
Read more

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience. When you think of Payment Services Directive 2 (PSD2), what likely springs to mind is the implementation of the Secure Customer Authentication rule (SCA). SCA was brought in as an additional…
Read more

Feeling secure enough to use open source for IAM projects

Identity is big, really big, especially when it is customer facing. There are a lot of moving parts to build, pieces to hook up, and external functionality to integrate. The whole makes the identity ecosystem which was once a dream of a few but is fast becoming a reality for many. Part of this movement…
Read more

Oh No, Not Another Article About Passwords: Will WebAuthn Replace Passwords or Not?

The humble, much-maligned password has been in the news again lately. The FIDO Alliance and W3C announced in April the release of the password killer web API named WebAuthn. But, are we singing the “Bye, bye password” song, only to start up a chorus of “You say goodbye and I say hello”? Let’s take a…
Read more

The Cloud’s the Limit for Secure, Complaint, Identity Storage, and Personal Data

Back in 2009, I gave a talk about Cloud identity. It went down, less like a fluffy Cloud and more like a lead balloon. It was too early – way too early. But as we reach peak Cloud adoption, with rates of uptake reaching 93%, the sky’s the limit for digital identity. Cloud computing has…
Read more

What Happens If… Disaster Recovery for the Smart City and Beyond

Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too…
Read more