Identity verification and management trends

Issue 8 2023 Information Security

Ofer Friedman and Mark Brady of AU10TIX, a global provider of identity verification and management solutions and services, offered SMART Security Solutions some interesting insights into what we can expect from identity fraudsters and the industry next year, ranging from criminal exploitation of AI and digital IDs to multi-layer fraud protection and the need for more control over personal information sharing.


Mark Brady.

Digital IDs and fraud

Ofer Friedman: Chief Business Development Officer, AU10TIX: We will see the beginning of fake identity whitewashing. As consumers migrate to digital IDs, they will have to undergo a verification process. That is the opportunity that criminals will use to create identities that will not be checked later because they are already digital. So, they will whitewash fake identities, convert them into digital IDs, and then be exempt from ID verification processes from then on.

Mark Brady: VP of Emerging Product, AU10TIX: As a community, we expect more focus on the interoperability of different digital identities. There are many different regional or professional standards, and we need to figure out how they can coexist and be accepted universally.


Ofer Friedman.

Digital wallets and fraud

Ofer Friedman: In 2024, we will see the first attempts to break into digital wallets. We have already heard talk about fraudsters either breaking into mobiles to change them or creating a new type of fake - the faking of QR codes that can be used to get data out of the wallet.

Mark Brady: The identity verification industry will continue working to solve the business economics for digital identities. In the new world of digital IDs and wallets, the IDV (identity verification) provider’s role will change. More experimentation will come with business models.

Artificial intelligence and fraud

Ofer Friedman: 2024 will be the year of the inverse parabola of fraudster AI adoption. Most identity fraudsters will not be using AI so that it will be the opposite of the typical bell curve. Instead, it will be effectively adopted primarily by, on one end, amateurs using the free or very inexpensive applications available, and on the other end, sophisticated criminal organisations using professional tools and injection to commit large-scale identity fraud.

Mark Brady: Two-layered identity fraud protection will gain momentum as the new standard because of its ability to detect professional-level fraud. Current solutions only look at one layer (traffic level), and the steady increase in global fraud this year clearly indicates that professionals have figured out a workaround, which is putting pressure on regulators to make a change.

Personal identity information control

Mark Brady: Control will be a major theme in 2024. In the new world of digital credentials, people will have more control over what they are comfortable sharing. For example, if you are online gaming or at a bar, do they really need to know your date of birth or just that you are of age?


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...