Robert O'Farrell CTO at ID-Pal
In the first four articles of this series (Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)) we outlined the current methods of identity verification. Now we must look towards the horizon. As with any technological evolution, new threats emerge, requiring us to adapt and innovate. As the technology moves for...
18 December 2023 /security /identity Digital Identity Management
Priya Kumari Digital Content Marketing Specialist at MSys Technologies
Introduction In today's dynamic and increasingly digital financial landscape, the quest for maximizing conversions while minimizing financial fraud has become a top priority for businesses. Machine learning models play a pivotal role in achieving this dual objective, as they are adept at quickly and efficiently processing and analyzing vast amount...
15 December 2023 /security /crime Artificial Intelligence and Financial Services
In part three of the series (Current Techniques in Identity Verification: Establishing a Chain of Trust) we started discussing the tests that computers can perform to verify a person’s identity. We ended that with a discussion of how ID document verification can be used to establish that you are dealing with a true identity. In this article we ...
12 December 2023 /security /identity Digital Identity Management
Mike Kresse SVP Money Movement & Retail Solutions at FIS
As all investors know, there can be no reward without risk. With volumes rocketing, card-not-present (CNP) payments offer the potential to generate handsome rewards. But in parallel, the risk of fraud is escalating and CNP fraud now accounts for around 73% of total card fraud. This blog considers how payment providers can balance the risks and rew...
11 December 2023 /security /payments
Mark Nutt Senior Vice President, International Sales at Veritas
Whether your source of news is the FT, the BBC or the Daily Mail, headlines of data related business outages, and associated credibility damage are on the rise. From data outages to increasingly audacious ransomware attacks on all levels of public and private organisations– data management has become a mainstream topic and highly visible. Today...
06 December 2023 /security Financial Risk Management
So far in this series we’ve addressed how humans establish trust in a person’s identity (The Foundations of Identity Verification: Trust and it's Pillar's) and the challenges and opportunities computers face when performing the same task (Computerized Trust: How Machines Establish Our Identity). In this third part of our five-part series, we mov...
04 December 2023 /security /identity Digital Identity Management
Shailendra Malik SVP - Tech Delivery (Data Platform) at DBS Bank
In the fast-paced world of project management, staying ahead of timelines and ensuring seamless collaboration among team members is crucial. With the advent of Language Model (LLM) and Artificial Intelligence (AI) technologies, project managers now have powerful tools to streamline project tracking tasks. Let us explore how project managers can l
01 December 2023 /security /predictions Artificial Intelligence and Financial Services
In our previous article (The Foundations of Identity Verification: Trust and its Pillars), we walked through the essence of how trust is established in the real world. Now, in part two of our five-part series, let's venture into the realm of machines. Here we explore the cold yet intricate logic they employ to answer the same age-old question: &...
27 November 2023 /security /identity Digital Identity Management
Fatemeh Nikayin Co-Founder at Rivero
In this rapidly evolving digital landscape, there has been an unprecedented proliferation of payment methods, each designed to cater to ever-evolving needs for convenience and speed. However, this hasn't come without its own set of complications – namely, the rise in payment disputes. As fraud rates surge at an alarming pace, it has become impera...
22 November 2023 /security /payments Payments strategies 2015-2020-2030
In the modern world, trust is more than just a human sentiment. It's the foundation of how we secure transactions, interactions, and ensure the integrity of our digital selves. As we navigate the vast online spaces, the question, "Who are you?" takes on heightened importance. This is the first in a five-part series examining identity ve
20 November 2023 /security /identity Digital Identity Management
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.