The Identity and Beyond Blog

Filter by

Most Recent

arrow-down
Comparing Identification vs. Verification vs. Authentication

Identification vs. Verification vs. Authentication vs. Authorization: Comparing Definitions & Key Differences

February 14, 2020

Data breaches, compliance mandates, and identity theft have made it increasingly difficult for organizations and individuals to establish trust online. Yet, for those very same reasons, it’s more important than ever. From the baseline identification of a customer or user to the recurring authentication process of ensuring that the person logging into or using your…

10 Tips to Convert More Customers During Account Onboarding [Infographic]

10 Tips to Convert More Customers During Account Onboarding [Infographic]

February 06, 2020

The digital onboarding journey is in need of a serious shake-up. While 72% of consumers want an all-digital onboarding experience, they’re clearly not happy with the current state of affairs — 56% of online bank account applications in the UK were abandoned due to a long or complicated enrollment process. There are a number of…

Unclaimed Property Fraud

Why States’ Unclaimed Property Websites are Becoming a Lucrative Target for Fraud

January 28, 2020

There are literally billions of dollars — somewhere between $40 billion and $50 billion — of unclaimed property held by states. Each year, unclaimed or abandoned assets are turned over to each state’s Unclaimed Property divisions by financial institutions and businesses that lose contact with the owners of those assets. Each state’s treasury department serves…

What is Regtech?

Regtech: What It Is and What It Means for the Future of Financial Technology

January 23, 2020

What is regtech? Regulatory Technology is an emerging field that applies new technologies to manage the administration of regulatory requirements, and is considered a subset of fintech (technologies that make financial activities more efficient). Here’s how John Dwyer, senior research analyst at Celent, explains the growth of regtech. “By harnessing technology to improve and optimize…

AI & Automatic ID Recognition

How Jumio Uses AI for Automatic Recognition of ID Documents

December 04, 2019

Jumio recently announced the beta launch of Jumio Go, a fully automated identity verification solution. Jumio Go combines AI, OCR and certified liveness detection technologies to automatically extract ID document data and validate the user’s digital identity in real time. Jumio Go, along with Jumio’s entire suite of identity verification and authentication solutions, automatically performs…

Why KYC Is Essential to Security for Banking Institutions

November 19, 2019

The Hudson United Bank of New Jersey was one of the banks used by the airplane hijackers who perpetrated the deadliest attack ever on American soil on Sept. 11, 2001. According to the 9/11 Commission, money-laundering safeguards within the financial industry at the time were not designed to detect or disrupt the type of deposits,…

How Jumio’s Investment in AI is Delivering Big Results for Our Customers

How Jumio’s Investment in AI is Delivering Big Results for Our Customers

November 05, 2019

Today we’re excited to announce some big improvements in our industry-leading identity verification and authentication solutions. Made possible by our multi-year investment in AI, automation and product development, these innovations are onboard now to help you fight fraud and meet your compliance requirements, while converting good customers faster. We invite you to get the complete…

Jumio Go Says No-Go to Deepfakes, Bots and Sophisticated Spoofing Attacks

Jumio Go Says No-Go to Deepfakes, Bots and Sophisticated Spoofing Attacks

October 28, 2019

Your marketing department comes up with a great campaign. They think through all the wording and craft pithy catchphrases to capture the imagination of your target market. They develop email campaigns, banner ads, social posts and even some direct mail — all with the intent of generating bona fide prospects to your website. These campaigns…

Taking the Sting Out of Data Breaches

Taking the Sting Out of Data Breaches

October 25, 2019

Recently, you may have heard about a company that experienced a data breach, and because you didn’t patronize this company, you presumably breathed a sigh of relief. But don’t get too comfortable — chances are your data may get compromised in the next breach, or the one after that. When there’s a big data breach,…

Good Enough?

When Good Enough isn’t Good Enough

October 22, 2019

Think back to the last online account you created. It may have been a new bank account, or perhaps a new social media or online dating profile. Chances are you were asked questions like “Which of the following addresses have you resided at in the last five years?” This is part of the identity proofing…

Will Deepfake Technology Defeat Biometric Authentication?

Will Deepfake Technology Defeat Biometric Authentication?

October 10, 2019

Deepfakes are everywhere. From video impersonations to celebrity face swaps, they are becoming the modern-day meme because they’re relatively simple to create. A deepfake superimposes existing video footage of a face onto a source head and body using advanced neural network powered AI. In other words, a deepfake looks to be a real person’s recorded…

AML in Switzerland

AML: The Changing Regulatory Landscape of Switzerland

September 17, 2019

Switzerland needs online identity verification now. While this technology is nothing new to Swiss regulators, Swiss banks and financial institutions have been slow to roll it out and are hurting themselves by not acting sooner. Back in 2016 the Swiss Financial Market Supervisory Authority (FINMA) started allowing Swiss-based financial institutions to use online identity verification…