Join the Community

21,033
Expert opinions
43,881
Total members
322
New members (last 30 days)
116
New opinions (last 30 days)
28,295
Total comments

Digital Identity Management

Discuss upcoming trends in digital proofing, authentication, fraud and digital identity management.

Adam Preis

Adam Preis Global Strategist at Ping Identity

Navigating the digital identity landscape: A blueprint for financial services competitiveness

In the fast-paced realm of financial services, digital transformation is reshaping the competitive landscape. The emergence of digital disruptors has redefined customer expectations, emphasising the need for seamless, secure, and tailored financial experiences. As Charles Darwin aptly noted, survival depends on adaptability to change. In today's f...

/security /payments

Barley Laing

Barley Laing UK Managing Director at Melissa

Preventing fraud in a globalised world

As migration increases and globalisation continues at pace, financial institutions around the world are having to review and verify a greater range of identification (ID) documents when onboarding customers than they traditionally would. This is backed up by research from the United Nations (UN) highlighting that nearly four per cent of the world’...

/identity /crime

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Horizon of Identity Verification: New Threats and Future Techniques

In the first four articles of this series (Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)) we outlined the current methods of identity verification. Now we must look towards the horizon. As with any technological evolution, new threats emerge, requiring us to adapt and innovate. As the technology moves for...

/security /identity

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)

In part three of the series (Current Techniques in Identity Verification: Establishing a Chain of Trust) we started discussing the tests that computers can perform to verify a person’s identity. We ended that with a discussion of how ID document verification can be used to establish that you are dealing with a true identity. In this article we ...

/security /identity

Barley Laing

Barley Laing UK Managing Director at Melissa

The money laundering red flags and how to prevent it in 2024

Supporting criminal activity and risking substantial fines from regulators that also damage their reputation are not things any financial institution aspires to. Yet many are exposing themselves to such risks because they are not doing enough to prevent money laundering. With digitalisation creating new opportunities for money laundering to take p...

/regulation /inclusion

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust

So far in this series we’ve addressed how humans establish trust in a person’s identity (The Foundations of Identity Verification: Trust and it's Pillar's) and the challenges and opportunities computers face when performing the same task (Computerized Trust: How Machines Establish Our Identity). In this third part of our five-part series, we mov...

/security /identity

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Computerized Trust: How Machines Establish Our Identity

In our previous article (The Foundations of Identity Verification: Trust and its Pillars), we walked through the essence of how trust is established in the real world. Now, in part two of our five-part series, let's venture into the realm of machines. Here we explore the cold yet intricate logic they employ to answer the same age-old question: &...

/security /identity

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Foundations of Identity Verification: Trust and Its Pillars

In the modern world, trust is more than just a human sentiment. It's the foundation of how we secure transactions, interactions, and ensure the integrity of our digital selves. As we navigate the vast online spaces, the question, "Who are you?" takes on heightened importance. This is the first in a five-part series examining identity ve

/security /identity

Donica Venter

Donica Venter Marketing at Traderoot

The Role of Digital Identity in Promoting Financial Access and Inclusion in Africa

In recent years, Africa has witnessed substantial growth in its digital landscape, significantly altering the way people access financial services. Digital innovations, particularly in the domain of digital identity, have played a central role in extending financial access and fostering inclusion across the continent. In this discussion, we delve ...

/payments /inclusion

Barley Laing

Barley Laing UK Managing Director at Melissa

Delivering effective sanctions screening amid growing FCA concerns

Finextra recently reported that many of those in financial services were found wanting with their sanctions screening efforts by the Financial Conduct Authority (FCA). After a survey of sanctions controls at 90 firms the FCA uncovered deficiencies across staffing, technology and reporting networks, leading to a lack of adequate resources to ensure...

/regulation /identity