Cyber Security 4 min What is spear phishing and why is different from common phishing? Discover what are the main types of spear phishing attacks to be aware... 05/05/2023
Cyber Security < 1 min Tinder uses video identity verification to secure exchanges The popular dating app announced a new video identity verification to combat fake... 03/05/2023
Digitalization for Business 2 min Customer onboarding: banks see higher churn A survey conducted among 1,623 IT decision makers revealed this... 02/05/2023
Digital Transformation 4 min Three things you need to know on the eIDAS Regulation What is it, what services does it provide and what are the advantages... 18/04/2023
Digital Identity 2 min Air Canada verifies identity with facial recognition The innovation was introduced on a voluntary basis as part of a pilot... 06/03/2023
Digitalization for Business 4 min How to ensure a secure authentication method to your customers This is how companies get customer onboarding and secure access to their online... 24/02/2023
Digital Identity 4 min Pros and cons of biometrical authentication This method uses one's unique physical attributes as proof of identity... 06/02/2023
Digital Identity 4 min Strong authentication vs multi factor authentication How these methods help verify the identity of a person who needs to... 27/01/2023
Digital Identity 2 min A brief guide on how to activate Two-Factor Authentication It is based on 3 types of validation: something you know, something you... 21/10/2022
Digitalization for Business 2 min Strong Authentication for e-Commerce and PSD2 directive What you need to know and what effects it will have on e-commerce... 16/09/2022
Artificial Intelligence 3 min What is Intelligent Adaptive Authentication An AI-driven authentication solution identifies user behavior patterns and assess risk in real-time... 15/09/2022
Digital Identity 3 min How and why to use two-factor authentication Two-factor authentication is the safest protection system for digital accounts... 05/09/2022