5-Killer-Onboarding-Mistakes

5 Killer Mistakes When Onboarding New Players in Online Gaming

When it comes to online gaming, there are a number of converging regulatory trends that are challenging operators’ ability to quickly verify and onboard new players. If you’re a UK-based operator, you now have to contend with new UKGC rules to prevent underage gambling. These new rules prevent players from gambling until their name, address […]

Read more...

What is Facial Recognition … and How Does It Differ from Facial Authentication?

There’s a healthy degree of confusion between facial recognition and facial authentication, but the underlying technologies are often very different and designed to address different use cases. With the launch of Apple iPhone X and its successors, facial recognition has gone mainstream and helped consumers recognize that their faces could serve as their password. In […]

Read more...

6 Glaring Limitations of OCR for Identity Verification

We’re starting to observe a new market phenomenon: the rise of DIY online identity verification and efforts by companies to cobble together OCR technology, facial recognition software and low-cost manual review teams. Want to learn more now? Download Jumio’s eKYC in APAC Guide.  At its face, this approach makes some sense, but it’s important to understand […]

Read more...

How APAC Fintechs and Banks Can Get eKYC Right

Banks are striving to grow their customer base through faster, easier and lower-cost digital channels. Yet, the current regulatory and cybersecurity landscape creates a layer of complexity. Consumers want the convenience of signing up through digital channels, but financial institutions must comply with stringent anti-money laundering (AML) and know your customer (KYC) regulations that typically […]

Read more...
Apple-Face-ID

Is Apple’s Face ID Strong Enough for Identity Proofing?

Apple’s Face ID lets users easily unlock their phones with a simple 3D scan of their face. Make no mistake, Face ID is a quantum improvement from traditional pin/password combinations which can be stolen via the dark web, phishing attacks or social engineering. And its facial recognition capabilities are more secure than traditional facial recognition […]

Read more...

The Sudden Emergence of KYP: Know Your Patient

Over the last decade, there have been over 2,550 health care data breaches impacting more than 175 million medical records. That’s the equivalent of affecting more than 50 percent of the U.S. population. What’s not commonly understood is that medical records command a high value on the dark web. These medical records can be listed […]

Read more...
CCPA

CCPA: Making Sense of California’s Strict New Data Privacy Law

Is your business ready for January 1, 2020? This is the date when the California Consumer Privacy Act, or CCPA, is slated to take effect. It’s expected to be the strictest data privacy law in the U.S., and will require data privacy protections and requirements similar to or broader than those imposed by GDPR. The […]

Read more...

A More Sensible Approach to Account Recovery

Let’s face it — passwords suck. Why? Let me count the ways: They’re routinely forgotten They’re highly insecure thanks to near-weekly data breaches They’re usually pretty crackable They’re often shared with friends and family They’re reused and recycled across websites That’s why they’re usually considered the weakest link in the security chain. And that’s one […]

Read more...