Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Enhancing Identity Verification in Loan Origination with Face Trace

In a rapidly digitalizing world, data and identity security have never been more paramount. As organizations adapt to this reality, one domain witnessing significant evolution is loan origination. The advent of sophisticated technologies, including artificial intelligence (AI) and biometrics, has made it possible to implement robust identity verification systems. Enter Face Trace, an innovative biometric face verification product that is reshaping the future of secure financial transactions.

Privileged Access Management in the Cloud

CEO and Co-Founder of Entitle, Ron Nissim recently had the opportunity to be a guest speaker on the renowned podcast, "Identity at the Center." Hosted by industry experts Jim McDonald and Jeff Steadman, this informative podcast focuses on identity security within the context of identity and access management (IAM). With their extensive experience in the field, Jim and Jeff bring listeners insightful conversations, industry news, and interviews with key figures from the identity management industry.

EP 31 - How Generative AI is Reshaping Cyber Threats

While generative AI offers powerful tools for cyber defenders, it’s also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology.

Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might call him a cyborg and be right), which is why his grandkids call him “Robo Papa.” ChatGPT knows all of this.

From Paper to Digital: Transitioning to OCR Bank Statements

Banks and other financial organisations must digitise their information for quicker storage and retrieval as they process millions of client papers annually. An developing technique called optical character recognition (OCR) makes it possible to extract data from PDFs and photos and convert them to Excel, CSV, and other formats. With the use of OCR, banks can swiftly extract client information from PDF documents, transform it, and make it searchable.

The 3 Stages of Money Laundering: A Comprehensive Guide

Money laundering is one of the most common forms of organised financial crime in the world. To ensure you understand the stages of money laundering, let’s delve into the most frequently asked questions about money laundering, the three stages of money laundering and the typical approach that typically ensues the money laundering process, types of money laundering, and the prevention of money laundering in a variety of industries especially using AML Screening technologies in 2023.

Data Sovereignty: Balancing Residency Requirements and Access Rights

Global organizations – and the data they collect and use on a daily basis – exist today both within and beyond the traditional physical boundaries of countries. They may have cloud infrastructure that spans the world, but local laws and regulations can still have a big impact on how data needs to be stored and accessed, even if it’s in the cloud.