Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity


The Ultimate Guide to Digital Footprinting: How to Use Email Risk Profiling for Digital Identity Verification

Your digital footprint, also known as a digital shadow or electronic footprint, encompasses the traces of data you leave behind while navigating the online world. This includes your visited websites, sent emails, and submitted information. By understanding digital footprints, we can effectively track online activities and devices associated with individuals.


Implementing Fingerprint Biometrics: Best Practices for Identity Verification

We all possess identifiable physical traits that are singular and unrivalled, commonly referred to as biometric attributes. Fingerprints, voice, and face traits are well-known biometric characteristics that are frequently utilised in identity verification. Consequently, what is biometric verification? Identification of people using these distinctive, previously described traits is known as biometric verification. In this way, you may demonstrate your identity in both a real and digital setting.


RBI Flags C-KYC as High Risk: Impact on Lenders, Banks, and the Importance of Liveness Detection & Face Match

Using AI-enabled Face Match and Passive Liveness Detection Technology, IDcentral’s eKYC verification solution provides an additional layer of Identity Verification for online user onboarding. Along with increased accuracy, IDcentral’s KYX solution cuts down on onboarding friction associated with traditional KYC and ID verification techniques.


EP 28 - Safeguarding Data in the Cloud

In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information.


User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same username or credentials. Devices and applications use platform-specific user registries that are distinct from each other. As a result, organizations may end up monitoring five user identities from five devices separately, while they actually belong to a single user. The table below shows one user, Michael Bay, using different user identities to log on and access various devices and applications.

Red Hat and CyberArk Develop an Approach To Centralize and Automate Secrets Management

Discover the power of Red Hat and CyberArk as they join forces to revolutionize your security practices. Say goodbye to being controlled by secrets and embrace a centralized, automated approach that guarantees a secure environment without compromising your freedom. Explore the ultimate solution to keep your systems protected while enjoying enhanced flexibility. Watch now and unlock a new era of cybersecurity!

Unlocking Key Insights and Use Cases of Data Orchestration in Identity Verification Solutions

Business Insider reports that the identity verification market is anticipated to reach a value of $12.8 billion by 2024 as a result of the rising amount of digital transactions that require precise and trustworthy identification data. However, a lot of individuals don’t comprehend what identity entails. Identity is more complicated than it first looks since it can vary based on the setting and sector. For the various sources of identification data to be combined, data orchestration is essential.


Learnings from Discussing Identity Security with IDC

A few months ago, I had the pleasure of speaking with Jay Bretzmann, research vice president of security products at IDC. We discussed various security topics trending in 2023, including open identity standards, passwordless technologies like passkeys enabled by FIDO 2.0, and identity-first zero trust security strategies. It became clear that we had an opportunity to share these insights by turning our conversations into an Analyst Connection interview.