Remove Authentication Remove Banking Remove Licensing
article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

Digitalization is a double-edged sword for banks, especially when it comes to security. As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy.

article thumbnail

Authentic Digital Relationships

Phil Windley

Our online relationships with ecommerce companies, social media providers, banks, and others are cold and impersonal, but also relatively efficient. Supporting Authentic Relationships. Driver's license, potentially from a different agencies than the one who registers cars and potentially in different states.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs Struggle To Find The Machine Learning Employees That They Need

The Accidental Successful CIO

People with the CIO job at banks, insurers and other financial companies say efforts to expand their use of artificial intelligence are being hampered by a scarcity of both data and employees with the skills that are needed. Banks and financial institutions understand that they need more AI workers. In the U.S.,

article thumbnail

Token-Based Identity

Phil Windley

Peter references a white paper on central bank digital currencies and one on identity composability by Andrew Hong to lead into a discussion of account- and token-based identity. And while you do have an account with your bank, the brilliance of the credit card is that you no longer have to have accounts with every place you want credit.

Insurance 137
article thumbnail

DRM Protection: The Key to Securing Your eBooks

Kitaboo

Mechanisms of DRM Protection Encryption Authorization and Licensing Watermarking and Traceability Controls and Permissions Expiration Control III. Intellectual Property Protection Consumer Trust Cross Platform Compatibility Regulatory Compliance Licensing Flexibility IV. Advantages of DRM Protection? Future of DRM Protection V.

eBook 78
article thumbnail

The AI cat and mouse game has begun

CIO Business Intelligence

The incident involved scammers who, using publicly available videos and audio from YouTube of targeted senior executives, created deepfake representations to deceive a finance employee into executing multiple transactions to bank accounts in Hong Kong, resulting in significant financial damage to the company.

Social 122
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

For example, I may have a credential representing my drivers license and one representing my employee ID. Yet, because they're based on a metasystem and use a common protocol, I could go to the bank and use those in concert to prove that I'm employed (employee ID) and my date of birth (drivers license) at the same time in one operation.

System 86