socure, NIST Cybersecurity, HITTRUST

Socure and HITRUST

Posted by Mike Sleap on Apr 18, 2019

Since announcing Socure’s HITRUST certification, we’ve received several inquiries regarding the reasons we pursued it, the difficulty we had obtaining it, and what we’re going to do with it. All good questions. We’ll do our best to address the top inquiries below.

Identity verification, socure, Artificial Intelligence, AI, third party fraud

Become the Single Trusted Source of Identity Verification

Posted by Tom Thimot on Mar 5, 2019

Last week was very exciting at Socure as we announced our latest funding round. In the short time since this news went public, I’ve received a number of questions about Socure. People are inquiring about things such as what do you solve for, what is your market position, can you share your future goals, how do you utilize AI, etc.  

Digital Identity, Fraud, socure, Data Breach

Can we secure online identities?

Posted by Socure on Oct 30, 2018

How can we secure identities online? In a brief video interview with Yale Insights, Socure’s Co-Founder and Chief Strategy Officer Sunhil Madhu discusses the current state of affairs when it comes to data breaches and fraud (spoiler alert: it’s safe to assume everyone’s data has been stolen several times over); the ways in which current tokenization efforts are not enough; and how social networks and connections are the wave of the future (and the present) when it comes to verifying and securing identity.

Fraud, Identity verification, socure, Credit bureau, Millennials, Identity theft

End-to-end customer life-cycle management through data science

Posted by Socure on Oct 2, 2018

In today’s digital world, identity verification is becoming increasingly important as the threat of identity fraud continues to grow. In 2017, there were more than 1,200 data breaches, with more than 2 billion separate identities stolen. Already in the first half of 2018, identity theft and synthetic identity attacks have more than doubled from Q4 of 2017. Traditional identity verification uses static rules and linear models applied to credit bureau data, which is often stale and easily accessible to fraudsters because, if we’re being honest, your birthday, Social Security number, and mother’s maiden name have already most likely been leaked in some previous data breach. So with these kinds of numbers, it’s clear that companies must rethink how best to originate user accounts online and develop new approaches for verifying their users. 

Download the ID+ Data Sheet

DOWNLOAD

Subscribe to receive the latest Socure posts.