PINDROP BLOG

Category: Authentication

July 26, 2019
Trends in Insurance | How Can We Prevent Fraud?
Across the board, insurers found they were experiencing a huge uptick in fraud. As insurers (and other enterprises across industries) invest in technology to prevent and detect fraudsters from hacking their way into accounts, the fraudsters invest their time in researching and scheming ways to get around it. Fraudsters are becoming more sophisticated, moving their…
Read More →
July 9, 2019
The Story of a Top 10 Insurance Company
In the insurance industry, many insurers run into problems with data privacy and account takeover. Fraudsters often target independent accounts from insurance agents, because that exposure can lead to the additional exposure of hundreds of consumer accounts. In this particular case, the fraudsters were exposed to $32M. The organization discovered that the fraudsters targeting their…
Read More →
June 26, 2019
AI | Infant Technology in Training
The promise of artificial intelligence is too attractive to ignore. Ideas range from discerning trends we are currently unable to see and optimizing decision making to hundreds of other ways AI could make our lives easier is too tempting to not entertain. Artificial intelligence is capable of solving complex problems from housing to disease –…
Read More →
May 31, 2019
Deepfakes | What You Need To Know
Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound like real footage. However, the difference is – it’s completely fake. The origin of the term deepfake comes from a pair of deep learning, the technology that makes it possible,…
Read More →
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the authentication solution in question. Traditional voice biometric software requires a customer to enroll actively, meaning they have to intently participate in saying a phrase or have the agent start to…
Read More →
May 20, 2019
Authentication Myths | Our Voices Never Age
Did you know that like the rest of your body, your voice is not immune from the ravages of time? Your vocal cords lose elasticity and flexibility and can even dry out. The larynx is a muscle just like any other and can atrophy, become thinner and weaker over time. Your lung size can even…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than anytime before in history, and the growing amount of cybersecurity…
Read More →
May 6, 2019
Authentication Myths | Keeping the Bad Guys Out
Sorry folks, authentication solutions won’t keep all the bad guys out. Authentication solutions allow the good guys to be identified – but that doesn’t mean everyone else is a bad guy.    A lot of enterprises deploy a call center authentication solution designed to ‘whitelist’ the good guys, and ‘blacklist’ all the bad actors who…
Read More →
May 1, 2019
Authentication Myths | The Truth About Voice Biometrics
Voice biometrics create an impenetrable obstacle for fraudsters. Fact or fiction? The answer to this may seem obvious – fiction. However, claims like voice biometrics software being able to tell the difference between identical twins or detect a professional voice imitator persist even though both have been disproven. In May of 2017, a BBC researcher…
Read More →
April 26, 2019
Authentication Myths | Do You Know What You’re Dealing With?
Today, a battle wages between what is fake and what is real. This warfare has extended into our day-to-day use of technology as we begin to understand how this technology can fool not only our ears, but also our eyes. And because of this, the stakes have never been higher for security methods surrounding identity…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats