Resource library Blog Entry 13 trends for IDV/identity verification in 2022 Blog Entry ABC’s of Identity Lifecycle Video Alexey Khitrov | Passive facial liveness Video Alexey Khitrov | Building a successful biometric capability Video Alexey Khitrov | The role of voice biometrics Video Mike Diamond | Check fraud trends Video Mike Diamond: Check fraud defender Video Mike Diamond: Mitek check + identity business Video Amy Walraven | Identity fraud vs. identity theft Video Amy Walraven | Continuous authentication during the lifecycle of the customer Blog Entry What is digital identity and why should you care Blog Entry Digital identity verification and data privacy Blog Entry What is Check Fraud? Blog Entry Advantages and Disadvantages of NFC Blog Entry The ATO threat: how strong is your line of defense? Infographic Identity lifecycle best practices infographic Blog Entry What is two-factor authentication? Is it enough? Blog Entry Fraud hides behind poor images Blog Entry Eliminating bias in in biometric authentication: How to make your algorithms work for you On-Demand Webinar PYMNTS: Biometrics Roudtable Blog Entry What is multi-factor and risk based authentication? Research Report PYMNTS report: Authenticating identities in the digital economy Blog Entry Identity verification vs. identity authentication - do you know the difference? Blog Entry Continuous authentication key to securing customers’ digital identities Pagination First page « First Previous page ‹ Previous … Page 2 Page 3 Page 4 Page 5 Current page 6 Page 7 Page 8 Page 9 Page 10 … Next page Next › Last page Last »