Filter by
Most Recent
- Most Recent
- Most popular
All time
- All time
- This Month
- This Year
Identification vs. Verification vs. Authentication vs. Authorization: Comparing Definitions & Key Differences
Data breaches, compliance mandates, and identity theft have made it increasingly difficult for organizations and individuals to establish trust online. Yet, for those very same reasons, it’s more important than ever. From the baseline identification of a customer or user to the recurring authentication process of ensuring that the person logging into or using your…
10 Tips to Convert More Customers During Account Onboarding [Infographic]
The digital onboarding journey is in need of a serious shake-up. While 72% of consumers want an all-digital onboarding experience, they’re clearly not happy with the current state of affairs — 56% of online bank account applications in the UK were abandoned due to a long or complicated enrollment process. There are a number of…
Why States’ Unclaimed Property Websites are Becoming a Lucrative Target for Fraud
There are literally billions of dollars — somewhere between $40 billion and $50 billion — of unclaimed property held by states. Each year, unclaimed or abandoned assets are turned over to each state’s Unclaimed Property divisions by financial institutions and businesses that lose contact with the owners of those assets. Each state’s treasury department serves…
Regtech: What It Is and What It Means for the Future of Financial Technology
What is regtech? Regulatory Technology is an emerging field that applies new technologies to manage the administration of regulatory requirements, and is considered a subset of fintech (technologies that make financial activities more efficient). Here’s how John Dwyer, senior research analyst at Celent, explains the growth of regtech. “By harnessing technology to improve and optimize…
How Jumio Uses AI for Automatic Recognition of ID Documents
Jumio recently announced the beta launch of Jumio Go, a fully automated identity verification solution. Jumio Go combines AI, OCR and certified liveness detection technologies to automatically extract ID document data and validate the user’s digital identity in real time. Jumio Go, along with Jumio’s entire suite of identity verification and authentication solutions, automatically performs…
Why KYC Is Essential to Security for Banking Institutions
The Hudson United Bank of New Jersey was one of the banks used by the airplane hijackers who perpetrated the deadliest attack ever on American soil on Sept. 11, 2001. According to the 9/11 Commission, money-laundering safeguards within the financial industry at the time were not designed to detect or disrupt the type of deposits,…
How Jumio’s Investment in AI is Delivering Big Results for Our Customers
Today we’re excited to announce some big improvements in our industry-leading identity verification and authentication solutions. Made possible by our multi-year investment in AI, automation and product development, these innovations are onboard now to help you fight fraud and meet your compliance requirements, while converting good customers faster. We invite you to get the complete…
Jumio Go Says No-Go to Deepfakes, Bots and Sophisticated Spoofing Attacks
Your marketing department comes up with a great campaign. They think through all the wording and craft pithy catchphrases to capture the imagination of your target market. They develop email campaigns, banner ads, social posts and even some direct mail — all with the intent of generating bona fide prospects to your website. These campaigns…
Taking the Sting Out of Data Breaches
Recently, you may have heard about a company that experienced a data breach, and because you didn’t patronize this company, you presumably breathed a sigh of relief. But don’t get too comfortable — chances are your data may get compromised in the next breach, or the one after that. When there’s a big data breach,…
When Good Enough isn’t Good Enough
Think back to the last online account you created. It may have been a new bank account, or perhaps a new social media or online dating profile. Chances are you were asked questions like “Which of the following addresses have you resided at in the last five years?” This is part of the identity proofing…
Will Deepfake Technology Defeat Biometric Authentication?
Deepfakes are everywhere. From video impersonations to celebrity face swaps, they are becoming the modern-day meme because they’re relatively simple to create. A deepfake superimposes existing video footage of a face onto a source head and body using advanced neural network powered AI. In other words, a deepfake looks to be a real person’s recorded…
AML: The Changing Regulatory Landscape of Switzerland
Switzerland needs online identity verification now. While this technology is nothing new to Swiss regulators, Swiss banks and financial institutions have been slow to roll it out and are hurting themselves by not acting sooner. Back in 2016 the Swiss Financial Market Supervisory Authority (FINMA) started allowing Swiss-based financial institutions to use online identity verification…