Identity Verification Blog

Recent developments in identity and authentication.

You've been subscribed!

Study: 41% of Mobile Apps are Vulnerable to Outside Attack

Have you ever second guessed yourself on just how safe your personal data is, especially after giving permission to apps to collect data on you mobile device? According to a recent study, you might be right to feel wary.  Three University of Hong Kong researchers discovered that out of the 600 top U.S and Chinese … Continued

Could this Tech Journalist’s “Epic Hacking” Take Place Today?

The rise of online identity theft highlights the importance of multi-factor authentication for digital identities. Thanks to social media and e-commerce, nearly everyone has a large online footprint hackers can exploit to carry out online attacks. Unfortunately, tech journalist Mat Honan found that out the hard way in 2012. In the timespan of one hour, … Continued

How Digital Exhaust Both Harms and Protects Your Online Identity

Have you ever had your identity stolen? If you said no, then unfortunately you are probably wrong. According to digital identity experts, most Americans have had their identity compromised at some point. According to, “if one were to add up the total number of accounts that have been compromised as a result of data … Continued

Japan’s National Digital Identity Initiative Stumbles

Japan, a nation often lauded for its advanced technological infrastructure and policy, has hit what seems to be a major roadblock when it comes to implementing a national digital identity program, called My Number. More than a year in, it’s only reached about a third of its citizenry. The major cause for the sluggish integration? … Continued

TeleSign Unveils Behavior-Based Authentication SDK

Authentication continues to evolve and solve many challenges with digital identity. Solutions such as two-factor authentication and multi-factor authentication have become a standard for account integrity, yet create cumbersome user experiences and remain vulnerable to malicious activity. Identifying avenues to enhance account security using data and analytics is the next phase for digital identity authentication. … Continued

Eliminating The Human Factor From Digital Security

The speed to which the market is introducing new innovative ways for people to improve their productivity and quality of life is exciting. However, this fast pace also introduces additional risk when security does not match the pace of advancement–particularly when people are the point of vulnerability. As more of our daily activities are transitioned … Continued

State Identity Verification – Michigan Case Study

Improving security online does not have to increase friction with the end user. In a pilot conducted in the State of Michigan, identity verification services for State benefits programs were moved online. This allowed for users to gain access to benefits without the need to present themselves for an in-person proofing event. The Research Triangle Institute … Continued

Did Microsoft Buy LinkedIn to Create a New Digital Identity Service?

In 2016, Microsoft bought LinkedIn for 26 billion dollars, a sum that seemed high to many observers. Jiri Kram, a FinTech CTO, has an interesting hypothesis that justifies the acquisition and the price. In “The Untold Secret of why Microsoft happily paid 26 billion USD for LinkedIn,” Jiri observes that LinkedIn forms a vital link … Continued

4 Issues with Blockchain in Identity

In 2016 we saw the rise of crypto-currency, and with it the underlying technology that allows it to function – blockchain. Blockchain is a public ledger of all transactions that have ever been executed. In some circles it is viewed as the Rosetta stone because it allows for highly secure anonymous transactions to be conducted … Continued

The Legal Identity Void CEO Blake Hall and Experian Fraud and Identity Solutions Senior Business Consultant Keir Breitenfeld discuss: social media-based identity verification (2:24), developing world identity differences (4:21), hurdles to increased adoption of digital identity (5:58), proliferation of identity verification methods (8:40), the legal identity void on the internet (10:59), the importance of standards (14:11), the ‘goldilocks’ … Continued

More Posts