Articles about Identity Management

Businesses face identity and security challenges due to COVID-19

identity theft mask

The rise of remote working and the growing complexity of securely managing multiple types of end user devices has seen 77 percent of businesses intending to increase spending on identity and access management solutions.

A study by ESG Research, sponsored by directory platform JumpCloud, finds an additional 20 percent plan to keep their IAM spending at existing levels, and 49 percent of respondents say they plan to consolidate IAM controls, using fewer security vendors.

Continue reading

New identity tool helps combat digital fraud

Deception

Spotting potentially fraudulent customers and transactions is difficult. But a new tool from identity verification firm Ekata uses machine learning to help identify good and bad customers.

Network Score uses the Ekata Identity Network, a proprietary global dataset of billions of customer transactions, to reduce the number of false transaction declines and increase the precision of fraud detection.

Continue reading

How technology can help protect against identity fraud [Q&A]

unknown identity

The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.

We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.

Continue reading

94 percent of organizations suffer identity-related breaches

identity theft mask

According to a new survey, 79 percent of organizations have experienced an identity-related breach in the last two years, while 94 percent report having had one at some point.

The study from the The Identity Defined Security Alliance (IDSA), based on a survey of over 500 IT security and identity decision makers conducted by Dimensional Research, finds that 66 percent say phishing is the most common cause of identity-related breaches, while 99 percent believe their breaches were preventable.

Continue reading

In a world of deepfakes, who can you trust?

Deception

Though they seem like something out of a futuristic sci-fi movie, deepfakes are very much a reality. In fact, developers have been experimenting with deepfake technology as far back as the late 1990s. Today, deepfakes have become so advanced and believable that they can cause some serious damage in the wrong hands.

"Deepfake" is a term used for the process of replacing someone in an existing image or video with someone else’s likeness. If you’ve watched Former U.S. President Barack Obama giving a lecture about cybercrime or follow the hilarious thread of videos in which various actors have their faces replaced with that of Nicolas Cage, you’ve seen a deepfake. As entertaining as they are, deepfake algorithms are getting more sophisticated every day. When we stop being able to differentiate this synthetic media from reality, a real problem arises.

Continue reading

What happens when your identity is stolen on social media? [Q&A]

identity theft mask

Scams involving social media and online dating sites are on the increase. So it's not surprising that recent research shows a majority of people are now worried about identity theft and account hijacking.

But what happens when your identity gets stolen? And what can you do to protect yourself from this kind of scam?

Continue reading

New biometric solution guards email against account takeovers

hands keyboard

At the root of most data breaches is a compromised account, but these can be very hard to identify, often coming to light only after they've been used to steal data.

Email security specialist GreatHorn is launching a biometric solution that effectively identifies compromised accounts and blocks takeover attempts by validating users using their unique typing patterns.

Continue reading

Majority of consumers worry about identity theft and account hijacking

identity theft hacker

A steady stream of data breaches has led most consumers to worry about the online crimes that lead to identity theft and account takeovers.

A new report from F-Secure shows almost nine out of 10 consumers are at least somewhat worried about their bank accounts being hacked to steal money (89 percent), online shopping fraud (87 percent), and someone committing a crime with their identity (87 percent).

Continue reading

Third-party access management leaves organizations exposed

Login screen

A survey of more than 1,000 IT security professionals exposes shortcomings in organizations' approach to managing third-party user identity and access that could leave them vulnerable to compromise.

The study by Dimensional Research for One Identity finds that while 94 percent of organizations grant third-party users access to their network, 61 percent admit they are unsure if those users attempted to or successfully accessed files or data they are not authorized to see.

Continue reading

New solution uses the cloud to simplify identity management

identity verification

Digital identity platform ForgeRock is launching an Identity Platform-as-a-Service solution to help developers embed modern identity capabilities into their apps.

ForgeRock Identity Cloud provides a full suite of capabilities for identity requirements in any business environment utilizing the same APIs and SDKs as the ForgeRock Identity Platform, so customers can use ForgeRock in any deployment model, on premises, hybrid cloud, public cloud, or as-a-service.

Continue reading

Unisys launches new cloud-based biometric identity service

Biometrics

With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.

To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.

Continue reading

Automated verification solution helps spot spoof and deepfake accounts

fake identities

A major problem for social media and other online businesses is the creation of spoof accounts. Guarding against these can be difficult but identity-as-a-service company Jumio has come up with a solution.

Jumio Go is a real-time, fully automated identity verification platform. It includes liveness detection to spot when photos, videos or even realistic 3D masks are used instead of actual selfies to create online accounts.

Continue reading

IT teams are keen to automate identity management

identity verification

Managing user accounts involves a range of tasks from access approvals to user credentials, compliance reviews and the perennially popular password reset.

Identity management company SailPoint is releasing results of its annual Market Pulse survey which finds many IT teams don't have enough time to get everything done and are looking to automate identity tasks.

Continue reading

New solution speeds up identity verification for enterprises

ID verification

Due to the potentially crippling effect of security breaches and data loss on both the bottom line and a brand’s reputation it's vital for organizations to protect their users.

Increasingly, identity management has become central to building seamless, secure digital engagement platforms, differentiating products, and winning long-term loyalty. However there can be a trade off between security and performance.

Continue reading

Can digital identity verification save the sharing economy?

With online sharing services (such as Uber, Airbnb and TaskRabbit) expected to be utilized by 86.5 million people by 2021, it is evident that the sharing economy is now mainstream. However, this$335 billion market is challenged by trust and safety concerns. Without trust, the sharing economy will not reach its full potential, and the only way to establish this trust is through digital identity verification to ensure users and providers in the sharing economy are who they claim to be.

Trust is required for the sharing economy to thrive -- the expectation that all parties are who they say they are and are operating in good faith. When hiring a worker from TaskRabbit, consumers trust the individual has been properly vetted. When a consumer orders a special occasion outfit from Rent the Runway, users trust it will arrive on time and in good condition. Users of the sharing economy trust that the company has verified the identities of its providers (e.g., drivers, delivery people, hosts, freelancers) and that their services are reliable and safe. Likewise, providers have faith that new users have passed some sort of identity verification before being accepted onto the sharing platform. When this trust is broken -- as we’ve seen on Craigslist,GoFundMe and elsewhere -- it cannot be easily repaired. 

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.