PINDROP BLOG

Category: Identity

June 26, 2019
AI | Infant Technology in Training
The promise of artificial intelligence is too attractive to ignore. Ideas range from discerning trends we are currently unable to see and optimizing decision making to hundreds of other ways AI could make our lives easier is too tempting to not entertain. Artificial intelligence is capable of solving complex problems from housing to disease –…
Read More →
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the authentication solution in question. Traditional voice biometric software requires a customer to enroll actively, meaning they have to intently participate in saying a phrase or have the agent start to…
Read More →
May 6, 2019
Authentication Myths | Keeping the Bad Guys Out
Sorry folks, authentication solutions won’t keep all the bad guys out. Authentication solutions allow the good guys to be identified – but that doesn’t mean everyone else is a bad guy.    A lot of enterprises deploy a call center authentication solution designed to ‘whitelist’ the good guys, and ‘blacklist’ all the bad actors who…
Read More →
March 25, 2019
The Madness of March | Will Your Authentication Solution Stand Up?
Each year in the spring, the NCAA holds a basketball tournament which is divided into brackets, and ultimately brings together two teams to compete in the National Championship – ending with a winner. Early on, viewers were invited to fill out a bracket of their own, in attempts to correctly predict the outcome of the…
Read More →
March 8, 2019
Natural Communication | The Latest Consumer Interface
From the first computers, which quickly made their way to being a major force of communication, to the advent of smartphones, consumers have always been at the forefront of changes and arrivals of interfaces and popular technology. Computers were characterized by the creation of passwords and PINs to keep track of accounts, logins, and access…
Read More →
December 10, 2018
Voice Biometrics: The ‘Thumbprint’ of the Future | Pindrop
Read More →
October 17, 2018
Privacy and Permissions | Google+
With Google making headlines about the privacy of apps and the breaking news of the Facebook data breach earlier this year, it has become clear that the apps on our phones are now holding, and disseminating, large amounts of data and are doing so most of the time. More often than not, we as consumers…
Read More →
August 29, 2018
A [Female] Voice of Concern
The number of people using digital assistants are growing by the day, and the increasing popularity has led to predictions of as many as 75% of US households owning smart speakers by 2020 according to Gartner. Within this expansive growth, there are several brands of assistants, including Amazon Alexa, Google Home, and Microsoft Cortana, taking…
Read More →
August 24, 2018
Zelle | A direct funds transfer disruptor…What Are You Trading For Convenience?
With convenience on the mind of most consumers, peer to peer payment apps are making it easy to transfer money to friends, family, or acquaintances. The money-transfer market is dominated by Venmo and Paypal, however, Zelle is quickly catching up, offering an alternative that is backed by U.S. financial institutions. Zelle is known for its…
Read More →
May 23, 2018
Call Center Fraudsters | Voice Morphing, Social Engineering, and the Need for Authentication
As technology advances, fraudsters use different, constantly evolving techniques that include exploiting the phone channel. With increasingly sophisticated attacks, fraudsters maneuver around authentication and security measures to access sensitive information that helps them take over accounts. This evolving criminal strategy is part of a $14 billion call center problem. From January 2016 to August 2017,…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats