Join the Community

21,342
Expert opinions
43,790
Total members
346
New members (last 30 days)
128
New opinions (last 30 days)
28,435
Total comments

Digital Identity Management

Discuss upcoming trends in digital proofing, authentication, fraud and digital identity management.

Clare Rowley

Clare Rowley Head of Business Operations at Global Legal Entity Identifier Foundation (GLEIF)

The Value of the LEI in Cross-Border Payments: Enhancing Account-to-Account (A2A) Owner Validation

The need to harmonize cross-border trust services continues to grow in line with the ever-increasing volume of trade and commerce taking place globally across digital platforms. In this effort, the LEI can play a fundamental enabling role. The Financial Stability Board (FSB) has already endorsed the LEI to support the goals of its G20-endorsed Road...

/payments /identity

Simon Horswell

Simon Horswell Fraud Specialist Manager at Onfido

From Friction to Fluidity: Ensuring Security and User Experience in Finance

In today’s digital world, 81% of people access online services daily. Against this backdrop, verifying identities online has become a new business standard. It’s a yardstick to measure an organisation’s digital readiness and resilience, which is why 1 in 2 end users now encounter digital identity verification (IDV) during the registration process....

/identity

Clare Rowley

Clare Rowley Head of Business Operations at Global Legal Entity Identifier Foundation (GLEIF)

Better Data, Better Business: Combat Identity-Related Fraud With the LEI

The global economy is wrestling with never-before-seen levels of identity-related fraud. Cybercrime costs in the United States reached an estimated 320 billion U.S. dollars as of 2023, according to Statista. Between 2017 and 2023, this figure has seen a significant increase of over 300 billion U.S. dollars. According to the latest estimates, this ...

/identity /crime

Adam Preis

Adam Preis Global Strategist at Ping Identity

Navigating the Dynamic Seas of Digital Identity in Insurance

The Perfect Storm In the vast ocean of the insurance industry, the winds of change are blowing stronger than ever before. Historically known for its conservative approach to technology adoption, the insurance sector finds itself at a crossroads. Enterprises are compelled to embrace digital transformation to navigate the evolving currents of regula...

/retail /identity

Adam Preis

Adam Preis Global Strategist at Ping Identity

Navigating the digital identity landscape: A blueprint for financial services competitiveness

In the fast-paced realm of financial services, digital transformation is reshaping the competitive landscape. The emergence of digital disruptors has redefined customer expectations, emphasising the need for seamless, secure, and tailored financial experiences. As Charles Darwin aptly noted, survival depends on adaptability to change. In today's f...

/security /payments

Barley Laing

Barley Laing UK Managing Director at Melissa

Preventing fraud in a globalised world

As migration increases and globalisation continues at pace, financial institutions around the world are having to review and verify a greater range of identification (ID) documents when onboarding customers than they traditionally would. This is backed up by research from the United Nations (UN) highlighting that nearly four per cent of the world’...

/identity /crime

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Horizon of Identity Verification: New Threats and Future Techniques

In the first four articles of this series (Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)) we outlined the current methods of identity verification. Now we must look towards the horizon. As with any technological evolution, new threats emerge, requiring us to adapt and innovate. As the technology moves for...

/security /identity

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)

In part three of the series (Current Techniques in Identity Verification: Establishing a Chain of Trust) we started discussing the tests that computers can perform to verify a person’s identity. We ended that with a discussion of how ID document verification can be used to establish that you are dealing with a true identity. In this article we ...

/security /identity

Barley Laing

Barley Laing UK Managing Director at Melissa

The money laundering red flags and how to prevent it in 2024

Supporting criminal activity and risking substantial fines from regulators that also damage their reputation are not things any financial institution aspires to. Yet many are exposing themselves to such risks because they are not doing enough to prevent money laundering. With digitalisation creating new opportunities for money laundering to take p...

/regulation /inclusion

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust

So far in this series we’ve addressed how humans establish trust in a person’s identity (The Foundations of Identity Verification: Trust and it's Pillar's) and the challenges and opportunities computers face when performing the same task (Computerized Trust: How Machines Establish Our Identity). In this third part of our five-part series, we mov...

/security /identity

Now Hiring