Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Silent authentication may be the next best thing for last-mile delivery
While most conglomerate merchants now offer decent delivery options, improvements remain to be made.
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
Facebook & Amazon have better authentication methods than enterprises, say IT pros
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Australia's Digital ID framework is now one step closer to reality
“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity."
Done deal: LexisNexis and ThreatMetrix fight fraud as one
"The marketplace recognises us for developing and leveraging technology and advanced analytics to innovate fraud solutions that protect society."
ThreatMetrix to merge with LexisNexis Risk Solutions after $1 billion buyout
Global analytics provider RELX Group has paid £580 million (AU$1.01 billion) to buy out the entire issue share capital of ThreatMetrix.
Auckland firm Verifi to provide online ID services for Lotteries Commission
Auckland-based identity verification firm Verifi will now provide services for the New Zealand Lotteries Commission for online age verification.
Fujitsu rolls out biometric palm vein authentication in Japan offices
Fujitsu is rolling out its biometric palm vein authentication solutions within its own company to replace passwords used by around 80,000 employees.
Gartner’s ten predictions for smartphone AI developments
Analysts predict 80% of smartphones shipped will have on-device AI capabilities by 2022.
Whitepaper: How MSPs can escape technology's all-too-familiar Catch-22
Managed service providers may be hurting themselves by relying on technology platforms that are ‘good enough'.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?