Businesses face identity and security challenges due to COVID-19


The rise of remote working and the growing complexity of securely managing multiple types of end user devices has seen 77 percent of businesses intending to increase spending on identity and access management solutions.
A study by ESG Research, sponsored by directory platform JumpCloud, finds an additional 20 percent plan to keep their IAM spending at existing levels, and 49 percent of respondents say they plan to consolidate IAM controls, using fewer security vendors.
New identity tool helps combat digital fraud


Spotting potentially fraudulent customers and transactions is difficult. But a new tool from identity verification firm Ekata uses machine learning to help identify good and bad customers.
Network Score uses the Ekata Identity Network, a proprietary global dataset of billions of customer transactions, to reduce the number of false transaction declines and increase the precision of fraud detection.
How technology can help protect against identity fraud [Q&A]


The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.
We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.
94 percent of organizations suffer identity-related breaches


According to a new survey, 79 percent of organizations have experienced an identity-related breach in the last two years, while 94 percent report having had one at some point.
The study from the The Identity Defined Security Alliance (IDSA), based on a survey of over 500 IT security and identity decision makers conducted by Dimensional Research, finds that 66 percent say phishing is the most common cause of identity-related breaches, while 99 percent believe their breaches were preventable.
In a world of deepfakes, who can you trust?


Though they seem like something out of a futuristic sci-fi movie, deepfakes are very much a reality. In fact, developers have been experimenting with deepfake technology as far back as the late 1990s. Today, deepfakes have become so advanced and believable that they can cause some serious damage in the wrong hands.
"Deepfake" is a term used for the process of replacing someone in an existing image or video with someone else’s likeness. If you’ve watched Former U.S. President Barack Obama giving a lecture about cybercrime or follow the hilarious thread of videos in which various actors have their faces replaced with that of Nicolas Cage, you’ve seen a deepfake. As entertaining as they are, deepfake algorithms are getting more sophisticated every day. When we stop being able to differentiate this synthetic media from reality, a real problem arises.
What happens when your identity is stolen on social media? [Q&A]


Scams involving social media and online dating sites are on the increase. So it's not surprising that recent research shows a majority of people are now worried about identity theft and account hijacking.
But what happens when your identity gets stolen? And what can you do to protect yourself from this kind of scam?
New biometric solution guards email against account takeovers


At the root of most data breaches is a compromised account, but these can be very hard to identify, often coming to light only after they've been used to steal data.
Email security specialist GreatHorn is launching a biometric solution that effectively identifies compromised accounts and blocks takeover attempts by validating users using their unique typing patterns.
Majority of consumers worry about identity theft and account hijacking


A steady stream of data breaches has led most consumers to worry about the online crimes that lead to identity theft and account takeovers.
A new report from F-Secure shows almost nine out of 10 consumers are at least somewhat worried about their bank accounts being hacked to steal money (89 percent), online shopping fraud (87 percent), and someone committing a crime with their identity (87 percent).
Third-party access management leaves organizations exposed


A survey of more than 1,000 IT security professionals exposes shortcomings in organizations' approach to managing third-party user identity and access that could leave them vulnerable to compromise.
The study by Dimensional Research for One Identity finds that while 94 percent of organizations grant third-party users access to their network, 61 percent admit they are unsure if those users attempted to or successfully accessed files or data they are not authorized to see.
New solution uses the cloud to simplify identity management


Digital identity platform ForgeRock is launching an Identity Platform-as-a-Service solution to help developers embed modern identity capabilities into their apps.
ForgeRock Identity Cloud provides a full suite of capabilities for identity requirements in any business environment utilizing the same APIs and SDKs as the ForgeRock Identity Platform, so customers can use ForgeRock in any deployment model, on premises, hybrid cloud, public cloud, or as-a-service.
Unisys launches new cloud-based biometric identity service


With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.
To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.
Automated verification solution helps spot spoof and deepfake accounts


A major problem for social media and other online businesses is the creation of spoof accounts. Guarding against these can be difficult but identity-as-a-service company Jumio has come up with a solution.
Jumio Go is a real-time, fully automated identity verification platform. It includes liveness detection to spot when photos, videos or even realistic 3D masks are used instead of actual selfies to create online accounts.
IT teams are keen to automate identity management


Managing user accounts involves a range of tasks from access approvals to user credentials, compliance reviews and the perennially popular password reset.
Identity management company SailPoint is releasing results of its annual Market Pulse survey which finds many IT teams don't have enough time to get everything done and are looking to automate identity tasks.
New solution speeds up identity verification for enterprises


Due to the potentially crippling effect of security breaches and data loss on both the bottom line and a brand’s reputation it's vital for organizations to protect their users.
Increasingly, identity management has become central to building seamless, secure digital engagement platforms, differentiating products, and winning long-term loyalty. However there can be a trade off between security and performance.
Can digital identity verification save the sharing economy?


With online sharing services (such as Uber, Airbnb and TaskRabbit) expected to be utilized by 86.5 million people by 2021, it is evident that the sharing economy is now mainstream. However, this$335 billion market is challenged by trust and safety concerns. Without trust, the sharing economy will not reach its full potential, and the only way to establish this trust is through digital identity verification to ensure users and providers in the sharing economy are who they claim to be.
Trust is required for the sharing economy to thrive -- the expectation that all parties are who they say they are and are operating in good faith. When hiring a worker from TaskRabbit, consumers trust the individual has been properly vetted. When a consumer orders a special occasion outfit from Rent the Runway, users trust it will arrive on time and in good condition. Users of the sharing economy trust that the company has verified the identities of its providers (e.g., drivers, delivery people, hosts, freelancers) and that their services are reliable and safe. Likewise, providers have faith that new users have passed some sort of identity verification before being accepted onto the sharing platform. When this trust is broken -- as we’ve seen on Craigslist,GoFundMe and elsewhere -- it cannot be easily repaired.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.