Building Trust in the Digital Economy With Blockchain Powered Digital Identity Verification Post date October 30, 2024 Post author By Pranav Khare Post categories In data-insecurity, data-privacy, decentralized-identity, digital-first-economy, digital-inclusion, financial-inclusion, fraudulent-identity, identity-verification
OIDC in the Cloud: Using OAuth/OIDC in AWS and Azure Post date October 25, 2024 Post author By Gilad David Maayan Post categories In identity-management, identity-verification, oauth2, oidc, oidc-in-aws, oidc-in-cloud-environments, openid, openid-connect
TSA and DHS Want Your Selfie: The Move Toward Biometric IDs for Travel Post date September 28, 2024 Post author By The Sociable Post categories In biometric-verification, digital-identity, hackernoon-top-story, id-systems, identity-management, identity-verification, remote-id-validation-tech, selfies-as-id
How ICP’s Walletless Solution Enhances Online Trust and Privacy Post date June 18, 2024 Post author By Ishan Pandey Post categories In decentralization, digital-identity, dlt, good-company, icp, identity-verification, internet-computer-protocol, proof-of-unique-humanity
Hey Crypto, Want Visa to Leave you Alone? KYC Post date November 27, 2021 Post author By Passbase Post categories In crypto, crypto-adoption, cryptocurrency, identity-theft, identity-verification, kyc-compliance, security, visa
Hacking Facial Recognition: How To Protect Your Company Agaist It Post date October 1, 2021 Post author By Jacob Sever Post categories In biometric-authentication, data-breach, facial-biometrics, identity-verification, liveness, privacy, security, spoofing-prevention
AI-Powered ID Verification: Guarding Digital Payment Gateways Post date September 20, 2021 Post author By TaraCruz Post categories In ai-powered-solutions, anti-money-laundering, artificial-intelligence, digital-payment-gateways, digital-payments, id-verification, identity-verification, transaction-verification
Combating Top 5 ID Fraud Threats of 2021 with Artificial Intelligence Post date August 10, 2021 Post author By Emily Daniel Post categories In artificial-intelligence, cybersecurity, digital-identity, fraud-detection, identity-theft, identity-verification, machine-learning, security
3 Tech-Driven Solutions Turning the Tide Against eCommerce Fraud Post date August 3, 2021 Post author By Andrej Kovacevic Post categories In cyber-security, cybersecurity, ecommerce, identity-verification, security, technology, tokenization
Biometric Authentication – Working, Methods, and Use Cases Post date July 5, 2021 Post author By Naresh Kumar Post categories In authentication, biometric-authentication, biometric-technology, biometrics, identity-and-access-management, identity-verification, multifactor-authentication, security
Programming a Keylogger in Python Post date June 10, 2021 Post author By Morpheuslord Post categories In cyber-threats, cybersecurity, data-breach, ethical-hacking, hacking, identity-management, identity-verification, keylogger, web-monetization
Bringing Top 5 Unconventional Identity Verification Solutions to The Table Post date May 28, 2021 Post author By Jesse Roy Post categories In authentication, biometric-authentication, cybersecurity, identity, identity-verification, kyc, nfc, security
SIM Swap Fraud is Rising: A New SIM-Based Auth API Comes to the Rescue Post date May 28, 2021 Post author By tru.ID Post categories In cyber-security, digital-identity, fraud-detection, good-company, identity-verification, mobile-security, sim-swap, two-factor-authentication
NFC Technology to Rescue the Digital ID Verification Industry Post date April 26, 2021 Post author By Emily Daniel Post categories In biometrics, contactless-transactions, digital-identity, id-verification, identity-verification, nfc, tech, technology
Accelerating Digital Asset Adoption with Crypto-Friendly KYC Post date March 25, 2021 Post author By Passbase Post categories In crypto-adopt, crypto-friendly-kyc, crypto-re, cryptocurrency, digital-asset-management, good-company, identity-verification, technology
PoW Shield: An Application Layer Proof of Work DDoS Filter Post date March 16, 2021 Post author By RuiSiang Post categories In computer-security, cybersecurity, ddos-mitigation, dos-attacks, how-to-prevent-ddos-attacks, identity-verification, network-security, verification