Join the Community

21,438
Expert opinions
43,598
Total members
353
New members (last 30 days)
142
New opinions (last 30 days)
28,480
Total comments

Latest /security expert opinions

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Horizon of Identity Verification: New Threats and Future Techniques

In the first four articles of this series (Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)) we outlined the current methods of identity verification. Now we must look towards the horizon. As with any technological evolution, new threats emerge, requiring us to adapt and innovate. As the technology moves for...

/security /identity Digital Identity Management

Priya Kumari

Priya Kumari Digital Content Marketing Specialist at MSys Technologies

Maximizing Conversions While Minimizing Financial Fraud: The Benefits of Machine Learning Models

Introduction In today's dynamic and increasingly digital financial landscape, the quest for maximizing conversions while minimizing financial fraud has become a top priority for businesses. Machine learning models play a pivotal role in achieving this dual objective, as they are adept at quickly and efficiently processing and analyzing vast amount...

/security /crime Artificial Intelligence and Financial Services

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)

In part three of the series (Current Techniques in Identity Verification: Establishing a Chain of Trust) we started discussing the tests that computers can perform to verify a person’s identity. We ended that with a discussion of how ID document verification can be used to establish that you are dealing with a true identity. In this article we ...

/security /identity Digital Identity Management

Mike Kresse

Mike Kresse SVP Money Movement & Retail Solutions at FIS

Card Not Present Transactions – Friend or Foe? – Transaction Volumes Are Soaring but so Is Fraud

As all investors know, there can be no reward without risk. With volumes rocketing, card-not-present (CNP) payments offer the potential to generate handsome rewards. But in parallel, the risk of fraud is escalating and CNP fraud now accounts for around 73% of total card fraud. This blog considers how payment providers can balance the risks and rew...

/security /payments

Mark Nutt

Mark Nutt Senior Vice President, International Sales at Veritas

How Financial Institutions Can Navigate the ‘Operational Resilience' imperative

Whether your source of news is the FT, the BBC or the Daily Mail, headlines of data related business outages, and associated credibility damage are on the rise. From data outages to increasingly audacious ransomware attacks on all levels of public and private organisations– data management has become a mainstream topic and highly visible.   Today...

/security Financial Risk Management

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust

So far in this series we’ve addressed how humans establish trust in a person’s identity (The Foundations of Identity Verification: Trust and it's Pillar's) and the challenges and opportunities computers face when performing the same task (Computerized Trust: How Machines Establish Our Identity). In this third part of our five-part series, we mov...

/security /identity Digital Identity Management

Shailendra Malik

Shailendra Malik SVP - Tech Delivery (Data Platform) at DBS Bank

Harnessing the Power of LLMs and AI Tools for Effortless Project Tracking

In the fast-paced world of project management, staying ahead of timelines and ensuring seamless collaboration among team members is crucial. With the advent of Language Model (LLM) and Artificial Intelligence (AI) technologies, project managers now have powerful tools to streamline project tracking tasks. Let us explore how project managers can l

/security /predictions Artificial Intelligence and Financial Services

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Computerized Trust: How Machines Establish Our Identity

In our previous article (The Foundations of Identity Verification: Trust and its Pillars), we walked through the essence of how trust is established in the real world. Now, in part two of our five-part series, let's venture into the realm of machines. Here we explore the cold yet intricate logic they employ to answer the same age-old question: &...

/security /identity Digital Identity Management

Fatemeh Nikayin

Fatemeh Nikayin Co-Founder at Rivero

Combatting Fraud in Payments: Essential Strategies for Issuing Banks Facing Dispute Challenges

In this rapidly evolving digital landscape, there has been an unprecedented proliferation of payment methods, each designed to cater to ever-evolving needs for convenience and speed. However, this hasn't come without its own set of complications – namely, the rise in payment disputes. As fraud rates surge at an alarming pace, it has become impera...

/security /payments Payments strategies 2015-2020-2030

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Foundations of Identity Verification: Trust and Its Pillars

In the modern world, trust is more than just a human sentiment. It's the foundation of how we secure transactions, interactions, and ensure the integrity of our digital selves. As we navigate the vast online spaces, the question, "Who are you?" takes on heightened importance. This is the first in a five-part series examining identity ve

/security /identity Digital Identity Management

Now Hiring