Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Theresa Payton on Identity Threats and the Chief 'Influence' Security Officer

You’re reading the CyberArk blog (and we thank you for that), so you’re likely familiar with the name Theresa Payton. The cybersecurity visionary, first female White House CIO, best-selling author and founder and CEO of Fortalice Solutions is a powerful industry voice, blending her frontline cybercrime fighting experience with cutting-edge insights to help organizations safely navigate the evolving threat landscape.

Keep Identity Real with MFA and Strong Credentials

Would you bet your business on the strength of every employee’s password? If you haven’t deployed business-grade MFA and credentials management throughout your organization, you are probably on the losing end of that bet. Here’s why: Despite the challenges, passwords are not going anywhere any time soon.

Harnessing Face Biometrics and Face Recognition for Robust Security in Complex Organizational Systems

Biometrics revolutionizes the authentication landscape by leveraging unique biological characteristics, such as fingerprints, iris patterns, and facial features. Unlike traditional methods, biometrics provides a highly reliable and secure means of identity verification. Among these modalities, face recognition emerges as a convenient and non-intrusive approach that ensures robust security while enhancing user experience.

Enhancing Identity Verification in Loan Origination with Face Trace

In a rapidly digitalizing world, data and identity security have never been more paramount. As organizations adapt to this reality, one domain witnessing significant evolution is loan origination. The advent of sophisticated technologies, including artificial intelligence (AI) and biometrics, has made it possible to implement robust identity verification systems. Enter Face Trace, an innovative biometric face verification product that is reshaping the future of secure financial transactions.

Privileged Access Management in the Cloud

CEO and Co-Founder of Entitle, Ron Nissim recently had the opportunity to be a guest speaker on the renowned podcast, "Identity at the Center." Hosted by industry experts Jim McDonald and Jeff Steadman, this informative podcast focuses on identity security within the context of identity and access management (IAM). With their extensive experience in the field, Jim and Jeff bring listeners insightful conversations, industry news, and interviews with key figures from the identity management industry.

EP 31 - How Generative AI is Reshaping Cyber Threats

While generative AI offers powerful tools for cyber defenders, it’s also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology.

Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might call him a cyborg and be right), which is why his grandkids call him “Robo Papa.” ChatGPT knows all of this.

From Paper to Digital: Transitioning to OCR Bank Statements

Banks and other financial organisations must digitise their information for quicker storage and retrieval as they process millions of client papers annually. An developing technique called optical character recognition (OCR) makes it possible to extract data from PDFs and photos and convert them to Excel, CSV, and other formats. With the use of OCR, banks can swiftly extract client information from PDF documents, transform it, and make it searchable.

The 3 Stages of Money Laundering: A Comprehensive Guide

Money laundering is one of the most common forms of organised financial crime in the world. To ensure you understand the stages of money laundering, let’s delve into the most frequently asked questions about money laundering, the three stages of money laundering and the typical approach that typically ensues the money laundering process, types of money laundering, and the prevention of money laundering in a variety of industries especially using AML Screening technologies in 2023.