Posted on 05 May 2023 by Thales DIS
Did you know that tattoos were some of the first forms of identity verification? They were ways to display attributes such as social status, familial ties and associations with certain groups. Similarly, did you know that we can record the use of fingerprints back to the ancient Babylonians who used them to seal business transactions […]
Posted on 28 March 2023 by Thales DIS
Have you ever been asked to take a selfie when signing up to a new bank? This is known as identity verification. From opening a new bank account, to applying for a new driver’s license, it’s becoming a common way of authenticating someone when they sign up to a new service. So how does it work? […]
Posted on 23 February 2023 by Françoise Bergasse
‘The holiday starts at the airport’… a common sentiment for many travellers. For those jetting away, the experience at the airport can really set the tone for the rest of the trip. Whether it be for business or pleasure, no one wants to spend endless hours queuing at security checkpoints, or repeatedly handing over travel […]
Posted on 31 January 2023 by Thales DIS
A lot can happen in the space of a single year. As technology evolves to open up new innovations and possibilities for businesses, they also give way to new challenges and considerations. So, what are some of the biggest challenges, and opportunities, businesses face in the year ahead of us? We spoke to some of […]
Posted on 27 January 2023 by Kristel Teyras
If you’ve worked in the technology industry for any amount of time, then you’ve heard the phrase ‘data is the new oil’. Like oil, raw data in itself isn’t valuable – but put to use, it can become extremely powerful. Businesses are using the power of data to transform and innovate and it’s hard to […]
Posted on 23 January 2023 by Tommi Seppala
In an age of increasing sophistication of cyber attacks, governments and partner organisations often find themselves as a target. These attacks often focus on identity, which can cause damage in the form of unencrypted data. Should hackers be successful in their attempts, it is possible they could allow fraudsters to manipulate electronic data in secure […]