Join the Community

22,722
Expert opinions
43,857
Total members
362
New members (last 30 days)
192
New opinions (last 30 days)
28,925
Total comments

Latest expert opinions

clear
clear

76 Results from 2023, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

The ‘Zelle Fraud’ Scam: What it Is and How to Avoid it

Zelle is one of the most famous platforms to quickly send money to loved ones, friends, and family. However, now cybercriminals are taking advantage of it to get people’s account information. Using clever tactics to fool clients, fraudsters are now taking advantage of the existence of Zelle to get customers to give them their account information. O...

/security

Ameesh Divatia

Ameesh Divatia Co-founder and CEO at Baffle

How Financial Services Companies Secure Data in a RAG GenAI Environment

Few industries have the competitive pressure to innovate — while under as much public and regulatory scrutiny for data privacy and security — as the financial services sector. So, as companies implement new applications and services using large language model (LLM) AI platforms like ChatGPT, the financial services industry must take a different ap...

/security Artificial Intelligence and Financial Services

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

The Horizon of Identity Verification: New Threats and Future Techniques

In the first four articles of this series (Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)) we outlined the current methods of identity verification. Now we must look towards the horizon. As with any technological evolution, new threats emerge, requiring us to adapt and innovate. As the technology moves for...

/security /identity Digital Identity Management

Retired Member

Retired Member 

Maximizing Conversions While Minimizing Financial Fraud: The Benefits of Machine Learning Models

Introduction In today's dynamic and increasingly digital financial landscape, the quest for maximizing conversions while minimizing financial fraud has become a top priority for businesses. Machine learning models play a pivotal role in achieving this dual objective, as they are adept at quickly and efficiently processing and analyzing vast amount...

/security /crime Artificial Intelligence and Financial Services

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust (continued)

In part three of the series (Current Techniques in Identity Verification: Establishing a Chain of Trust) we started discussing the tests that computers can perform to verify a person’s identity. We ended that with a discussion of how ID document verification can be used to establish that you are dealing with a true identity. In this article we ...

/security /identity Digital Identity Management

Retired Member

Retired Member 

Card Not Present Transactions – Friend or Foe? – Transaction Volumes Are Soaring but so Is Fraud

As all investors know, there can be no reward without risk. With volumes rocketing, card-not-present (CNP) payments offer the potential to generate handsome rewards. But in parallel, the risk of fraud is escalating and CNP fraud now accounts for around 73% of total card fraud. This blog considers how payment providers can balance the risks and rew...

/security /payments

Mark Nutt

Mark Nutt Senior Vice President, International Sales at Veritas

How Financial Institutions Can Navigate the ‘Operational Resilience' imperative

Whether your source of news is the FT, the BBC or the Daily Mail, headlines of data related business outages, and associated credibility damage are on the rise. From data outages to increasingly audacious ransomware attacks on all levels of public and private organisations– data management has become a mainstream topic and highly visible.   Today...

/security Financial Risk Management

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Current Techniques in Identity Verification: Establishing a Chain of Trust

So far in this series we’ve addressed how humans establish trust in a person’s identity (The Foundations of Identity Verification: Trust and it's Pillar's) and the challenges and opportunities computers face when performing the same task (Computerized Trust: How Machines Establish Our Identity). In this third part of our five-part series, we mov...

/security /identity Digital Identity Management

Shailendra Malik

Shailendra Malik SVP - Tech Delivery (Enterprise Search) at DBS Bank

Harnessing the Power of LLMs and AI Tools for Effortless Project Tracking

In the fast-paced world of project management, staying ahead of timelines and ensuring seamless collaboration among team members is crucial. With the advent of Language Model (LLM) and Artificial Intelligence (AI) technologies, project managers now have powerful tools to streamline project tracking tasks. Let us explore how project managers can l

/security /predictions Artificial Intelligence and Financial Services

Robert O'Farrell

Robert O'Farrell CTO at ID-Pal

Computerized Trust: How Machines Establish Our Identity

In our previous article (The Foundations of Identity Verification: Trust and its Pillars), we walked through the essence of how trust is established in the real world. Now, in part two of our five-part series, let's venture into the realm of machines. Here we explore the cold yet intricate logic they employ to answer the same age-old question: &...

/security /identity Digital Identity Management

Now Hiring