Page 122 - Cyber Defense eMagazine August 2023
P. 122

to do manually. The technology-driven  method is also scalable, which allows for substantial operational
            expense benefits.

            Not only that, but AI and machine learning can also perform facial recognitions, block user actions, detect
            suspicious  logins, and identify faulty transactions.  Effective  ID verification  requires a combination  of AI
            and ML, coupled with best-of-breed  facial recognition  and liveness detection  technology to detect fake
            identity documents and deepfakes, ensuring authorization is only granted to the correct person.




            Zero Trust Security Infrastructure

            As we’ve seen, digital  transformation  can cause a whirlwind of security issues. Oftentimes,  technology
            and  software  are  released  by  organizations  without  a  true  look  into  security  implications  or  potential
            vulnerabilities.  Methods that used  to be reliable,  such as one-time  passwords  and QR codes, now fall
            vulnerable to fraudsters. As methods of fraud increase, a Zero Trust approach –- the belief to never trust,
            always verify – will be critical to keeping bad actors at bay.

            A Zero Trust Security framework requires all users to verify their identity before gaining access to valuable
            information.  Even  after users are authenticated  once, they  will need to continue  verifying their  identity
            each  time  they  attempt  to  regain  access.  Each  user  and  device  should  be  authenticated,  meaning
            ultimate trust in a company’s identity proofing strategies will be key.


            With a cyber attack happening every 39 seconds, organizations must take a holistic approach to security
            by combining a number of best practices and technologies in order to effectively fight fraud. As the fraud
            landscape continues to evolve, companies must stay one step ahead of bad actors. Proactively adapting
            new  technologies  as  quickly  as  fraudsters  come  up  with  new  schemes  will  be  an  invaluable  line  of
            defense.



            About the Author

            Blair Cohen is the Founder and President of AuthenticID,  a disruptive and
            transformational  identity  proofing  and  fraud  prevention  technology
            company.  As  a  dynamic  technology  entrepreneur  with  over  30  years  of
            experience,  Blair  is  future-focused  and  can  anticipate  industry  needs,
            identify pain points, and then build systems to help organizations  improve
            their bottom line. Prior to turning his focus to solving the biggest challenge
            on earth, identity, Blair launched several other groundbreaking  enterprises
            and pioneering  technology  products. Named by One World Identity (OWI)
            as one of the 100 Most Influential Identity Experts globally, his articles can
            be  found  in  publications  like  Fast  Company.  He  frequently  speaks  at
            industry  conferences  focused  on  identity,  risk  management,  and  information  security.  Blair  can  be
            reached on LinkedIn and https://www.authenticid.com/







            Cyber Defense eMagazine – August 2023 Edition                                                                                                                                                                                                               122
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   117   118   119   120   121   122   123   124   125   126   127