Behavioural Biometrics for Fraud Prevention
Behavioural Biometrics for Fraud Prevention
Read blog postFacephi has been named a Representative Vendor in the 2024 Gartner® Market Guide for KYC Platforms for Banking
Behavioural Biometrics for Fraud Prevention
AI-generated videos are no longer just viral curiosities. Their use in identity fraud is real and expanding rapidly
Read blog postBuilding a secure, interoperable, and resilient Digital Public Infrastructure requires rethinking digital identity—integrating key technologies like biometrics and artificial in[…]
Read blog postThe evolution of key sectors such as banking, insurance, healthcare, and fintech, among others, has made it clear that identity verification can no longer be a one-time event. I[…]
Read blog postBy Ramón Villot Sánchez, Legal & Compliance Director Between the strength of a pioneering regulatory framework and criticisms of excessive bureaucracy The regulation of da[…]
Read blog postFinancial fraud linked to mule accounts has reached alarming levels. According to the UK Financial Conduct Authority, over $40 billion is laundered every week, with only 1% bein[…]
Read blog postDigital identity verification is a fundamental pillar for building trust in the banking sector. In the 2024 Gartner® Market Guide for KYC Platforms for Banking, Facephi has been[…]
Read blog postBy Federico Imoda Our solutions are designed to provide multiple layers of security that protect against various types of fraud. In the past five years—accelerating particular[…]
Read blog postThe rise of mule accounts in the financial ecosystem Did you know that in 2024 alone, an estimated $3.1 trillion in illicit funds circulated in the United States? Mule accounts[…]
Read blog postTravelling without a physical passport, without endless queues and without having to show documents at each touchpoint is no longer a utopia. Digital transformation on air trave[…]
Read blog postTravelling without a physical passport, without endless queues and without having to show documents at each touchpoint is no longer a utopia. Digital transformation on air trave[…]
Read blog postFinancial fraud continues to increase, not only in frequency but also in sophistication. More than 60% of fraudulent accounts get past traditional identity verification checks, […]
Read blog postFinancial fraud continues to increase, not only in frequency but also in sophistication. More than 60% of fraudulent accounts get past traditional identity verification checks, […]
Read blog postAfter exploring how Artificial Intelligence and X Computing will shape digital identity, we turn our focus to other major forces set to influence this field. In 2025, cybersecur[…]
Read blog postAfter exploring how Artificial Intelligence and X Computing will shape digital identity, we turn our focus to other major forces set to influence this field. In 2025, cybersecur[…]
Read blog postThe automatic capture of documents and faces has revolutionised digital verification processes in sectors such as finance, online gaming and transport. This technology enables a[…]
Read blog postThe automatic capture of documents and faces has revolutionised digital verification processes in sectors such as finance, online gaming and transport. This technology enables a[…]
Read blog postAs rapid advancements set higher standards for security, trust, and privacy, digital identity adapts to meet these demands. In 2025, breakthroughs in AI, X computing, cybersecur[…]
Read blog postAs rapid advancements set higher standards for security, trust, and privacy, digital identity adapts to meet these demands. In 2025, breakthroughs in AI, X computing, cybersecur[…]
Read blog postIn digital identity management, both users and companies face challenges. From password fatigue to data breaches, digital security is compromised by outdated authentication syst[…]
Read blog postIn digital identity management, both users and companies face challenges. From password fatigue to data breaches, digital security is compromised by outdated authentication syst[…]
Read blog postIn today’s cybersecurity landscape, Identity and Access Management (IAM) has become a critical and complex component of every digital identity protection programme. Digita[…]
Read blog postIn today’s cybersecurity landscape, Identity and Access Management (IAM) has become a critical and complex component of every digital identity protection programme. Digita[…]
Read blog postIn cybersecurity, where the battle between defenders and attackers is constant, the breaking out of deepfake technology has ushered in a new era of digital deception. An attack […]
Read blog postIn cybersecurity, where the battle between defenders and attackers is constant, the breaking out of deepfake technology has ushered in a new era of digital deception. An attack […]
Read blog postThe significance of the new EU Anti-Money Laundering framework This year is crucial for the European Union as it strengthens its fight against money laundering (ML) and terrori[…]
Read blog postThe significance of the new EU Anti-Money Laundering framework This year is crucial for the European Union as it strengthens its fight against money laundering (ML) and terrori[…]
Read blog postThe history of gaming in Brazil has gone through various stages. From the total prohibition of gambling in the 1940s to the selective legalization of certain types of betting, s[…]
Read blog postThe history of gaming in Brazil has gone through various stages. From the total prohibition of gambling in the 1940s to the selective legalization of certain types of betting, s[…]
Read blog postToday, personal information has become an invaluable asset, and it is essential to protect data both to safeguard users’ rights and to promote integrity and trust in organ[…]
Read blog postToday, personal information has become an invaluable asset, and it is essential to protect data both to safeguard users’ rights and to promote integrity and trust in organ[…]
Read blog postRecent advances in face recognition modelling have been achieved thanks to the availability of large datasets and deep learning models. However, large-scale data collection via […]
Read blog postRecent advances in face recognition modelling have been achieved thanks to the availability of large datasets and deep learning models. However, large-scale data collection via […]
Read blog postThe European Union has taken a crucial step by agreeing on an Artificial Intelligence Certificate that ensures the safe development of AI. It aims to protect fundamental rights,[…]
Read blog postThe European Union has taken a crucial step by agreeing on an Artificial Intelligence Certificate that ensures the safe development of AI. It aims to protect fundamental rights,[…]
Read blog postCyberattacks are still on the rise and they represent a serious threat to the security of companies and users. According to a report by Cybersecurity Ventures, the cost of cyber[…]
Read blog postCyberattacks are still on the rise and they represent a serious threat to the security of companies and users. According to a report by Cybersecurity Ventures, the cost of cyber[…]
Read blog postDigital identity management is becoming increasingly complex due, among other factors, to the rise in online accounts by users. This situation, coupled with the growth of the at[…]
Read blog postDigital identity management is becoming increasingly complex due, among other factors, to the rise in online accounts by users. This situation, coupled with the growth of the at[…]
Read blog postSince the beginning of the Covid-19 pandemic, an increasing number of public and private services have become digital, which requires Secure and reliable digital identification […]
Read blog postSince the beginning of the Covid-19 pandemic, an increasing number of public and private services have become digital, which requires Secure and reliable digital identification […]
Read blog postDigital security strategies are making progress towards the Continuous Adaptive Trust (CAT) model, which represents a significant evolution from the Zero Trust perspective. This[…]
Read blog postDigital security strategies are making progress towards the Continuous Adaptive Trust (CAT) model, which represents a significant evolution from the Zero Trust perspective. This[…]
Read blog postTechnological evolution has transformed the way we interact with the digital world, but along with these advances comes the crucial need to protect privacy and personal data. In[…]
Read blog postTechnological evolution has transformed the way we interact with the digital world, but along with these advances comes the crucial need to protect privacy and personal data. In[…]
Read blog postThe Qatar Central Bank’s (QCB) recent rollout of new e-KYC regulations signifies a major advancement in the financial sector’s digital evolution. These regulations a[…]
Read blog postThe Qatar Central Bank’s (QCB) recent rollout of new e-KYC regulations signifies a major advancement in the financial sector’s digital evolution. These regulations a[…]
Read blog postAs we already saw in Proof of address in the EU (Part 1), proving your address is a crucial procedure that guarantees the authenticity and validity of many administrative and co[…]
Read blog postAs we already saw in Proof of address in the EU (Part 1), proving your address is a crucial procedure that guarantees the authenticity and validity of many administrative and co[…]
Read blog postWhat is behavioural biometrics and how does it work? Behavioural biometric technology is a high-precision technology used to authenticate users based on their behavioural pat[…]
Read blog postWhat is behavioural biometrics and how does it work? Behavioural biometric technology is a high-precision technology used to authenticate users based on their behavioural pat[…]
Read blog postNavigating bureaucratic processes in the European Union (EU) is often daunting, especially when it comes to something as fundamental as proving your address. This requirement po[…]
Read blog postNavigating bureaucratic processes in the European Union (EU) is often daunting, especially when it comes to something as fundamental as proving your address. This requirement po[…]
Read blog postIn an ever-changing digital environment, digital identity verification is essential to building a more secure and innovative world. At Facephi, we proud to announce that we have[…]
Read blog postIn an ever-changing digital environment, digital identity verification is essential to building a more secure and innovative world. At Facephi, we proud to announce that we have[…]
Read blog postDigital identity has become an invaluable asset, where technological trends are rapidly evolving to offer more robust and secure solutions. At the heart of this revolution stand[…]
Read blog postDigital identity has become an invaluable asset, where technological trends are rapidly evolving to offer more robust and secure solutions. At the heart of this revolution stand[…]
Read blog postIn the field of digital identity verification, biometrics is a fundamental tool that faces new challenges in security, ethics and inclusion. Javier Barrachina, R&D Director […]
Read blog postIn the field of digital identity verification, biometrics is a fundamental tool that faces new challenges in security, ethics and inclusion. Javier Barrachina, R&D Director […]
Read blog postLegal framework for digital identity verification in Brazil Compliance encompasses the processes an organisation follows to operate in accordance with laws, regulations and ethi[…]
Read blog postLegal framework for digital identity verification in Brazil Compliance encompasses the processes an organisation follows to operate in accordance with laws, regulations and ethi[…]
Read blog postIn this article, we’ll explore the importance of facial liveness technology in online identity verification, a crucial defence against growing identity fraud in the digita[…]
Read blog postIn this article, we’ll explore the importance of facial liveness technology in online identity verification, a crucial defence against growing identity fraud in the digita[…]
Read blog postBiometric authentication involves using unique biological traits like fingerprints or facial features to verify an individual’s identity. In the rapidly evolving world of […]
Read blog postBiometric authentication involves using unique biological traits like fingerprints or facial features to verify an individual’s identity. In the rapidly evolving world of […]
Read blog postThe Southern African Development Community’s (SADC) financial landscape has undergone remarkable transformation, especially in South Africa, the region’s economic powerhou[…]
Read blog postThe Southern African Development Community’s (SADC) financial landscape has undergone remarkable transformation, especially in South Africa, the region’s economic powerhou[…]
Read blog postNIST, recognised as the most prestigious global evaluation and standardisation body for biometric technologies, hosted this recent evaluation. Our presentation attack detection […]
Read blog postNIST, recognised as the most prestigious global evaluation and standardisation body for biometric technologies, hosted this recent evaluation. Our presentation attack detection […]
Read blog postWhat is regulatory compliance? Regulatory compliance is the set of processes, practices and measures that an organisation follows to conduct its business in accordance with t[…]
Read blog postWhat is regulatory compliance? Regulatory compliance is the set of processes, practices and measures that an organisation follows to conduct its business in accordance with t[…]
Read blog postA legal identity is undeniably crucial. It’s not just a fundamental human right, but also the cornerstone of any thriving society, especially in our fast-evolving digital […]
Read blog postA legal identity is undeniably crucial. It’s not just a fundamental human right, but also the cornerstone of any thriving society, especially in our fast-evolving digital […]
Read blog postCryptocurrencies are digital currencies that use cryptographic methods to secure transactions. They are used in a decentralised system with blockchain technology, where each age[…]
Read blog postCryptocurrencies are digital currencies that use cryptographic methods to secure transactions. They are used in a decentralised system with blockchain technology, where each age[…]
Read blog postThe Digital Identity Revolution Identities are continually evolving in the digital era. Today, digital IDs are not just a convenience but a vital part of secure online transac[…]
Read blog postThe Digital Identity Revolution Identities are continually evolving in the digital era. Today, digital IDs are not just a convenience but a vital part of secure online transac[…]
Read blog postAviation is one of the sectors that has seen the most change in the last two decades. The diversification of the business model with the proliferation of low-cost companies and […]
Read blog postAviation is one of the sectors that has seen the most change in the last two decades. The diversification of the business model with the proliferation of low-cost companies and […]
Read blog postUncover how reusable identities with biometric data can revolutionise payment authentication, boosting security and user experience.
Read blog postUncover how reusable identities with biometric data can revolutionise payment authentication, boosting security and user experience.
Read blog postTraveling more easily and more safely, thanks to biometrics
Read blog postTraveling more easily and more safely, thanks to biometrics
Read blog postBlockchain and self-governance of data through biometrics
Read blog postBlockchain and self-governance of data through biometrics
Read blog postThe way we conduct banking is fundamentally changing. In a quest for a superior and more secure customer experience, financial organisations are increasingly adopting biometrics[…]
Read blog postThe way we conduct banking is fundamentally changing. In a quest for a superior and more secure customer experience, financial organisations are increasingly adopting biometrics[…]
Read blog postBiometric identity verification has become a crucial part of secure identity verification in the digital era. With the growing need for accurate and efficient identity managemen[…]
Read blog postBiometric identity verification has become a crucial part of secure identity verification in the digital era. With the growing need for accurate and efficient identity managemen[…]
Read blog postIn today’s business landscape, trust is the foundation for success. It drives customer loyalty and advocacy, elevates employee engagement, and fuels innovation. However, a[…]
Read blog postIn today’s business landscape, trust is the foundation for success. It drives customer loyalty and advocacy, elevates employee engagement, and fuels innovation. However, a[…]
Read blog postFollowing society’s rapid digitisation over the last decade, one concern of the newly born digital society is the use of shared data within the broad concept of Big Data. Given […]
Read blog postFollowing society’s rapid digitisation over the last decade, one concern of the newly born digital society is the use of shared data within the broad concept of Big Data. Given […]
Read blog postFacial recognition scans and even fingerprint sensors have transformed smartphones into remarkable tools for convenient authentication. A simple glance at your phone is now all […]
Read blog postFacial recognition scans and even fingerprint sensors have transformed smartphones into remarkable tools for convenient authentication. A simple glance at your phone is now all […]
Read blog postBiometric identity verification, the Achilles Heel of fraud
Read blog postBiometric identity verification, the Achilles Heel of fraud
Read blog postProtect your customer’s identity with Self-Sovereign Identity. Learn how to improve user experience, strengthen KYC, and eliminate intermediaries. Read more now.
Read blog postProtect your customer’s identity with Self-Sovereign Identity. Learn how to improve user experience, strengthen KYC, and eliminate intermediaries. Read more now.
Read blog postIntroduction Cryptocurrency exploded onto the scene in the last decade, revolutionising the way we store and transfer wealth. As the use of digital currencies becomes more wid[…]
Read blog postIntroduction Cryptocurrency exploded onto the scene in the last decade, revolutionising the way we store and transfer wealth. As the use of digital currencies becomes more wid[…]
Read blog postThe role of biometrics in the standardisation of processes to increase efficiency
Read blog postThe role of biometrics in the standardisation of processes to increase efficiency
Read blog postThis blog examines six common types of fraud that biometric identity verification can help prevent.
Read blog postThis blog examines six common types of fraud that biometric identity verification can help prevent.
Read blog postWhat tools can help increase its potential?
Read blog postWhat tools can help increase its potential?
Read blog postReusable digital identities are verified credentials that can be used both online and off at any time to prove a person’s identity.
Read blog postReusable digital identities are verified credentials that can be used both online and off at any time to prove a person’s identity.
Read blog postThe changes happening in customer purchasing dynamics over the last few years of the technological revolution have forced companies to rethink what products and services they of[…]
Read blog postThe changes happening in customer purchasing dynamics over the last few years of the technological revolution have forced companies to rethink what products and services they of[…]
Read blog postOnly a few years ago, biometric identity verification and authentication was just a blip on the radar of technological development. Today, virtually every mobile phone is unlock[…]
Read blog postOnly a few years ago, biometric identity verification and authentication was just a blip on the radar of technological development. Today, virtually every mobile phone is unlock[…]
Read blog postYou have probably come across the acronym AML before, which stands for Anti-Money Laundering. But how does this term relate to digital identity? It is a legal framework encompas[…]
Read blog postYou have probably come across the acronym AML before, which stands for Anti-Money Laundering. But how does this term relate to digital identity? It is a legal framework encompas[…]
Read blog postUX is king The use of biometric technology has expanded significantly in both the public and private sectors. This is hardly surprising considering that biomet[…]
Read blog postUX is king The use of biometric technology has expanded significantly in both the public and private sectors. This is hardly surprising considering that biomet[…]
Read blog postFollowing a dismal few years of travel restrictions, optimistic forecasts by the International Air Transport Association come as welcome news to the aviation sector. IATA expect[…]
Read blog postFollowing a dismal few years of travel restrictions, optimistic forecasts by the International Air Transport Association come as welcome news to the aviation sector. IATA expect[…]
Read blog postThe legal sector has always been fraught with AML challenges, but in recent years the stakes have been raised by surging risks, increasingly complex regulatory requirements, and[…]
Read blog postThe legal sector has always been fraught with AML challenges, but in recent years the stakes have been raised by surging risks, increasingly complex regulatory requirements, and[…]
Read blog postBiometric data is the answer to identity theft. For this reason, organisations need to ensure high levels of security while handling it “Nearly 42 million people were vic[…]
Read blog postBiometric data is the answer to identity theft. For this reason, organisations need to ensure high levels of security while handling it “Nearly 42 million people were vic[…]
Read blog postHappy International Identity Day everyone! It started as an initiative It started as an initiative from ID4Africa in 2018, an NGO that accompanies African nations on their journ[…]
Read blog postHappy International Identity Day everyone! It started as an initiative It started as an initiative from ID4Africa in 2018, an NGO that accompanies African nations on their journ[…]
Read blog postWorldwide, 1.4 billion people are unbanked. Without a bank account, these people often find it difficult or even impossible to send money, make online transactions — or access f[…]
Read blog postWorldwide, 1.4 billion people are unbanked. Without a bank account, these people often find it difficult or even impossible to send money, make online transactions — or access f[…]
Read blog postFor millions of people, the best form of ID is a digital ID. Digital ID is a verified and secure form of ID — installed on or accessed from a computer or mobile device which a p[…]
Read blog postFor millions of people, the best form of ID is a digital ID. Digital ID is a verified and secure form of ID — installed on or accessed from a computer or mobile device which a p[…]
Read blog postThe value of biometric data lies in its distinctiveness and resistance to fraud. This information, which is the product of encoding our facial features during onboarding, must b[…]
Read blog postThe value of biometric data lies in its distinctiveness and resistance to fraud. This information, which is the product of encoding our facial features during onboarding, must b[…]
Read blog postTo better understand the possibilities of facial biometrics, today we will focus on the differences and similarities between digital authentication and identification. Because, […]
Read blog postTo better understand the possibilities of facial biometrics, today we will focus on the differences and similarities between digital authentication and identification. Because, […]
Read blog postAs stated in the post on ethical biometrics, technology should be at the service of humans and not the other way around. Human action and monitoring is essential. That is why we[…]
Read blog postAs stated in the post on ethical biometrics, technology should be at the service of humans and not the other way around. Human action and monitoring is essential. That is why we[…]
Read blog postAt FacePhi we define our technology as “ethical biometrics” biometric technology that cares about how it is used. that’s why we only perform verification[…]
Read blog postAt FacePhi we define our technology as “ethical biometrics” biometric technology that cares about how it is used. that’s why we only perform verification[…]
Read blog postA few days ago, we talked about what biometrics was, so now we will focus on its applications. What are the uses of biometrics for the shared mobility sector? What are the uses […]
Read blog postA few days ago, we talked about what biometrics was, so now we will focus on its applications. What are the uses of biometrics for the shared mobility sector? What are the uses […]
Read blog postTalking about biometrics in medicine may sound like an almost science fiction-like futuristic concept, but its introduction in the health sector is today real and tangible; in m[…]
Read blog postTalking about biometrics in medicine may sound like an almost science fiction-like futuristic concept, but its introduction in the health sector is today real and tangible; in m[…]
Read blog postLiveness is the technology that makes it possible to determine if the interaction with the device is being carried out by a genuine and physically present person. Prior to the […]
Read blog postLiveness is the technology that makes it possible to determine if the interaction with the device is being carried out by a genuine and physically present person. Prior to the […]
Read blog postIn the pandemic situation due to COVID 19, in which older people have had to endure preventive and mandatory social isolation, the appearance of an app designed to align with di[…]
Read blog postIn the pandemic situation due to COVID 19, in which older people have had to endure preventive and mandatory social isolation, the appearance of an app designed to align with di[…]
Read blog postBiometrics is part of our lives almost without realising it, and we use it every day through simple, everyday gestures such as unlocking our mobile phone with our face, voice or[…]
Read blog postBiometrics is part of our lives almost without realising it, and we use it every day through simple, everyday gestures such as unlocking our mobile phone with our face, voice or[…]
Read blog postThe future of the sports events sector is already here, and it is set to transform the relationship between football clubs and their most important components, the fans. At a ti[…]
Read blog postThe future of the sports events sector is already here, and it is set to transform the relationship between football clubs and their most important components, the fans. At a ti[…]
Read blog postBanking has changed forever. Tedious and manual processes more typical of the 19th century have taken a back seat in recent years after a radical move to incorporate technology […]
Read blog postBanking has changed forever. Tedious and manual processes more typical of the 19th century have taken a back seat in recent years after a radical move to incorporate technology […]
Read blog postPedro goes out for a run one morning and sprains his ankle. The sprain will keep him off work for two months. “I won’t leave it another day to take out health insurance th[…]
Read blog postPedro goes out for a run one morning and sprains his ankle. The sprain will keep him off work for two months. “I won’t leave it another day to take out health insurance th[…]
Read blog postBiometric security companies and banks are coming to realise that they are a perfect match for one another. Banking has subsisted for centuries by adopting large scale changes w[…]
Read blog postBiometric security companies and banks are coming to realise that they are a perfect match for one another. Banking has subsisted for centuries by adopting large scale changes w[…]
Read blog post