Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Bias in Biometrics: How to Authenticate Quickly and Fairly Alix Melchy, VP of AI at Jumio Bias can creep into algorithms in several ways. AI systems learn to make decisions based on training data, which can include biased human decisions or... June 14, 2023 6:00pm Can We Have it All? How To Prioritise Security Without Hindering Your Workforce Box and Guests Security is a global business priority. The ability to manage valuable and sensitive data while simultaneously reducing financial, legal and reputatio... 2 months ago | 36 mins Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... 3 months ago | 59 mins The Ever-Increasing Sophistication of Fraudsters Stuart Wells, CTO at Jumio When opening an account, customers want a fast, secure and seamless onboarding process. With highly secured self- onboarding, prospects can access the... 1 month ago | 27 mins How Complete is your IoT Infrastructure? Where to start, where to end Nastaran Bisheban, Chief Technology Officer, KFC Canada In the era that your watch can track your vitals, your car get started with your cellphone, your digital speaker tells you a joke; how does it matter ... 10 months ago | 28 mins Cyber Notes Cast - Security Training Best Practices for Privileged Users senhasegura It is essential to train privileged users to avoid cyber threats, as they are the primary victims of hackers. Read our article and learn how to do it.... 4 days ago | 4 mins Is OTP inflation fraud your secret enemy?How to detect and stop this hidden risk Nemanja Nikolic, EMEA Regional Manager, telesign Today, business often takes place in the digital realm. With the shift to ecommerce and the need for fast digital identity verification, fraudsters ha... June 7, 2023 10:00am Decentralized Identity and Verifiable Credentials Travis Spencer, Curity's CEO; Jacob Ideskog, Curity's CTO A paradigm shift is upon us. It will put users in control of who they share their identity data with. By certifying this identity data as a “credentia... June 8, 2023 2:00pm Cyber Notes Cast - Learn All About Passwordless Authentication senhasegura Passwordless authentication has been a recommended option for IT teams. This is due to the fragility of passwords, which justifies the frequent news a... 6 days ago | 9 mins Prevent phishing with Azure AD CBA and YubiKeys on mobile devices Erik Parkkonen, Sr Solutions Architect, Yubico; Vimala Ranganathan, Sr. Product Manager, Microsoft Thanks to Microsoft’s general availability of Certificate-based authentication (CBA) on mobile, users can now bring their YubiKey from their desktop t... June 15, 2023 4:00pm Load more