Deepfakes | What You Need To Know

Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound like real footage. However, the difference is – it’s completely fake. The origin of the term deepfake comes from a pair of deep learning, the technology that makes it possible, and fake – because of…
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the…
Read More →
May 20, 2019
Authentication Myths | Our Voices Never Age
Did you know that like the rest of your body, your voice is not immune from the ravages of time? Your vocal cords lose elasticity and flexibility and can even dry out. The larynx is a muscle just like any other and can atrophy, become thinner and weaker over time. Your lung size can even decrease over time. All of…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is…
Read More →
May 6, 2019
Authentication Myths | Keeping the Bad Guys Out
Sorry folks, authentication solutions won’t keep all the bad guys out. Authentication solutions allow the good guys to be identified – but that doesn’t mean…
Read More →
May 1, 2019
Authentication Myths | The Truth About Voice Biometrics
Voice biometrics create an impenetrable obstacle for fraudsters. Fact or fiction? The answer to this may seem obvious – fiction. However, claims like voice biometrics…
Read More →
March 8, 2019
Natural Communication | The Latest Consumer Interface
From the first computers, which quickly made their way to being a major force of communication, to the advent of smartphones, consumers have always been at the forefront of changes and arrivals of interfaces and popular technology. Computers were characterized by the creation of passwords and PINs to keep track of accounts, logins, and access to personal information. Surpassing this,…
Read More →
April 26, 2019
How A Top 10 Stock Brokerage Reduced Average Call Handle Time
Did you know $14 billion is lost annually to phone fraud? Making the call center a common target to fraudsters, as most enterprises’s weakest link.…
Read More →
April 26, 2019
Authentication Myths | Do You Know What You’re Dealing With?
Today, a battle wages between what is fake and what is real. This warfare has extended into our day-to-day use of technology as we begin…
Read More →
March 25, 2019
The Madness of March | Will Your Authentication Solution Stand Up?
Each year in the spring, the NCAA holds a basketball tournament which is divided into brackets, and ultimately brings together two teams to compete in…
Read More →
February 13, 2019
Voice | A Password Close To Your Heart
Examining the evolution of technology, we have been caught in a trend moving toward natural conversations. The start of this timeline begins with computers, which…
Read More →
December 17, 2018
Retails’ Nightmare Before Christmas
With the stresses of Black Friday and Cyber Monday shopping behind us, the holiday shopping season of 2018 has almost come to a close. However,…
Read More →
December 10, 2018
Voice Biometrics: The ‘Thumbprint’ of the Future | Pindrop
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats