What you can expect from digital identity in 2024

SMART Access & Identity 2024 Access Control & Identity Management, Security Services & Risk Management


Lance Fanaroff.

As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur. Here are some trends we believe will shape the biometric identity market in the coming year.

1. Behavioural biometrics

Cybercriminals are increasingly weaponising generative AI tools to spoof human images and voiceprints used for identification at scale. These tools are growing more accessible, with professional criminals strengthening deepfake and bot attacks, and amateurs sourcing fraud-as-a-service kits on the dark web. Essentially, AI is able to define and replicate one of the strongest defences companies have had against crime in the past; authenticity. How do we get one step ahead in how we discern a genuine human interaction from a fraudulent one?

4D liveness facial biometrics is a safe and foolproof solution to this challenge, but additional, complementary solutions are entering the market. For example, biometric systems that authenticate users with real-time data such as typing patterns, gait analysis or voice recognition could offer enhanced security that does not require consumers to conduct any authentication actions.

Take the case of behavioural biometrics, which analyses a user’s digital, physical, and cognitive behaviour to distinguish whether the person behind the screen is a legitimate customer. A genuine user, for example, enters information in a particular manner. This pattern in human activity is increasingly being identified and analysed through machine learning, aiding in discerning whether an online activity is being driven by a human, or is part of an automated attack.

2. Ethics and privacy in biometrics

As biometric data becomes the dominant form of identification, necessary conversations about the ethics of biometric data collection and usage must occur. Consumers are rightfully concerned about how data is being used and if, for example, their identifying features could be used as part of surveillance. If used unethically, biometric tools could exhibit biases towards certain population groups or misidentify individuals, leading to, for example, wrongful incarceration.

Regulating the biometric space is becoming an issue of national urgency for many governments. The UK government, for example, has recruited new advisors for its Biometrics and Forensic Ethics Group (BFEG), which is responsible for defining how biometric data, forensic material, and large data sets are used in machine learning. In the US, the Department of Justice is creating a board on AI’s ethical and lawful use, including biometrics.

What biometric companies should be doing is to save the biometric data used as part of the face identification process, as a reference template. A reference template refers to a set of ones and zeros that match up to what our system deems a user’s face to look like. This cannot be viewed by the naked eye or used by any technology other than the biometrics company itself and is thoroughly protected.

3. Biometrics in the Internet of Things (IoT)

The Internet of Things refers to interconnected devices with sensors, processing ability, and software that connect and exchange data with other devices and systems within a network. This results in simplified daily processes for consumers. For example, a smart home in which manual tasks are automated, or a telematics device that measures your essential health data and communicates it with your health insurance provider in return for more accurate risk assessment. As more processes are automated, and more data is shared, a wealth of information needs to be protected. This offers a prime opportunity for biometrics to secure access to various IoT systems and devices.

4. Biometrics in healthcare

While banks, telecommunications companies and financial institutions have been exploring the possibilities of biometrics for a long time already, insurance companies, pension funds and employee benefits agencies are investing in biometrics in response to growing threats. A fascinating and essential application of biometrics is in healthcare; from patient identification and access control, to monitoring and managing health data. Biometrics could extend healthcare beyond traditional settings such as hospitals and doctors’ rooms, enabling efficient and secure remote diagnosis and electronic prescriptions. These interventions could revolutionise a sector that is hindered by a maze of logins and fragmented data.

Biometric identity could even improve access to healthcare services. For example, Ethiopia’s Ministry of Health has partnered with its national identity programme to integrate the Fayda digital ID with its healthcare sector. This will serve as a patient registry while supporting national health insurance schemes, employee and professional licensing, and the sharing of health records. Kenya has recently announced a biometric vaccination program pilot for newborns, and Rwanda is considering introducing biometrics to ensure that all children participate in routine immunisation campaigns.

In conclusion, the technology and ethics discussions around biometrics continue to evolve, resulting in biometric systems that consumers can trust. Ultimately, biometric identity can be a tool for empowerment, especially in Africa. As seen in these use cases, the more people use biometrics, the more they will be empowered to use their biometric identity to access and expedite other critical services such as voting and healthcare, or to protect their savings and data. I believe that in South Africa, we have the technology and the skills to catapult our services far beyond the status quo. This could result in greater protection against fraud in our country and serve as a catalyst for unprecedented growth.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
957 women killed in three months
News & Events Security Services & Risk Management
Despite years of summits, task teams and public commitments, South Africa’s femicide rate remains around five times higher than the global average, and too few are using the legal lifelines available.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.