Buyer’s guide to identity verification solutions
Learn what to look for in identity verification solutions, how to assess effectiveness and cost, and more.
How marketplaces like Neighbor design trust & safety programs to mitigate and fight fraud
Learn about key moments when fraudsters are likely to strike, Neighbor’s approach to fighting fraud, and more.
Social Security number (SSN) verification: What it is and why it matters
Learn about common types of SSN verification — plus the potential shortcomings of relying solely on a person’s SSN for verification purposes.
What is driver’s license verification?
Learn about this common way to verify someone’s identity or age.
What is AML transaction monitoring?
Learn how transaction monitoring works, why it's important, and more.
What is government ID verification?
Learn how government ID verification works, how it's evolving, and more.
What is identity fraud?
When someone uses a different identity to commit a crime, they’re engaging in identity fraud. Learn how to protect your business..
International KYB: Everything global businesses need to know
Learn what Know Your Business is, the unique challenges of addressing it on a global scale, and some of the laws governing KYB requirements around the world.
eIDV: A better way to protect your business and customers
Discover how to prevent fraud, streamline business operations, and increase conversions by electronically verifying your customers’ identities.
Marketplace fraud: The cost of inaction
Learn about the different types of marketplace fraud — and the negative repercussions that can happen when you don’t proactively prevent marketplace fraud on your platform.
Capture more fraud with less effort using link analysis via Persona Graph
Proactively stop hard-to-catch fraud in its tracks with Persona
Bring your identity verification global with Persona
Verify more users with higher assurance — wherever they are
3 tips for managing risk without sacrificing user experience
Get tips for balancing risk and conversion in your business, learn about emerging trends in the identity space, and more.
Identity management in digital health: protecting patient identities
How can organizations protect their patients and secure private health information? Learn how to master identity management in healthcare.
Why to assemble a trust and safety team for your organization
With instances of fraud on the rise, it's paramount for organizations to assemble trust and safety teams that are equipped to meet modern security demands.
Understanding and implementing FATF’s 40 Recommendations
Learn how FATF's 40 Recommendations to combat money laundering can impact your policies.
Get the best out of both worlds: How thoughtful manual review can enhance your automations
While it may be possible to completely automate your business’s fraud detection processes, it shouldn’t necessarily be your goal to do so. Learn why.
Why your business needs flexible identity infrastructure
Identity verification isn’t one-size-fits-all. Learn how a flexible identity infrastructure can help your business be more resilient.
What is the INFORM Consumers Act?
The INFORM Consumers Act is a law aimed at restricting online shopping fraud, while the SHOP Safe Act is a bill with the same goal. Learn more.
Understanding customer Source of Funds (SOF) and Source of Wealth (SOW)
Understanding the source of your customers’ funds and wealth is a crucial aspect of KYC and AML.
How device fingerprinting catches suspicious actors
Device fingerprinting is an effective way for organizations to catch suspicious actors in their tracks. Learn how you can apply it.
Link analysis: How can it help you spot fraud?
Link analysis is a method of analyzing data that allows you to study relationships that aren't visible in raw data. Learn more.
The most mind-blowing money laundering statistics of 2023
Learn more about the scale of this widespread problem.
NFC e-passport verification guide
NFC technology allows for a more secure identity verification process while improving usability. Learn how it works.
How match requirements allow you to fine-tune your IDV processes
Setting name match requirements is an important part of the identity verification process. Learn more about why it’s important to get them right.
What is Know Your Customer’s Customer (KYCC)?
KYCC is a powerful way to protect your reputation and guard against financial crimes.
Mobile KYC: How will it transform compliance?
Improve your verification processes with mobile KYC.
Student identity verification: How educational institutions can improve their IDV
In an increasingly digitized education space, student identity verification is becoming essential. Learn how it works.
A better customer verification process: How Persona is paving the way with NFC, mDL, and other new technologies
The verification process has never been more efficient thanks to the deployment of new technologies.
Global KYC: A KYC breakdown by countries
Learn how KYC regulations differ by country.
What is reverification, and why does it matter?
Establish trust with your users by implementing reverification at key touchpoints.
Understanding Ultimate Beneficial Owner (UBO) checks
Learn about this essential step in managing your risk and complying with AML regulations.
Power all of your identity operations with Persona's identity infrastructure
Businesses can build and unite any part of their identity operations with Persona’s configurable building blocks.
Document verification: Understanding the whole process
See how document verification works and how it can benefit your business.
Credential stuffing vs. password spraying
Learn how these two attacks differ and how to protect your business.
What is account creation fraud?
Learn what account creation fraud is, what it can look like, how it typically works, and how to protect your business and legitimate users.
What is marketplace fraud, and how do companies stop it?
Explore the different types of marketplace fraud and learn how to mitigate marketplace fraud in your business.
Web3 could be huge: How it handles trust and identity will be critical
Web3 just might be able to bridge the gap between an individual’s physical identity and their digital identity.
What is a Customer Identification Program (CIP)?
Learn what a CIP is, how it works, and what requirements CIPs need to meet.
Red Flags Rule: Your business’s role in preventing identity theft
The Red Flags Rule requires businesses to create a plan to identify and prevent identity theft. Find out who this rule applies to and how to comply.
Persona achieves ISO 27001 certification
Learn what this certification means for you and what's next.
Persona named one of the best authentication solutions by Cybernews
See what sets Persona apart from other solutions.
What are suspicious activity reports (SARs)?
Financial institutions must use suspicious activity reports (SARs) to report questionable activity to the appropriate body for legal investigation
CDD vs EDD: What’s the difference?
Explore how CDD and EDD work and learn when each is necessary.
New at Persona: Mobile driver's license (mDL) verification via Apple Wallet
Organizations that obtain Apple's entitlement will be able to accept mobile driver’s licenses (mDLs) as a form of identification within Persona’s verification flow.
What is identity verification (IDV)?
Learn what IDV is, explore how it works, and take a look at the different types of identity verification you may choose to leverage in your business.
Mobile driver’s licenses (mDLs) and your business
Take a closer look at what mobile driver’s licenses are, how they work, and the use cases they may present for your business.
What is selfie identity verification, and how does it work?
Learn about selfie identity verification and liveness detection, how they work together, the challenges they address, and their shortcomings.
What is Combating the Financing of Terrorism (CFT)?
By implementing procedures to combat the financing of terrorism, you can protect customers and help make the world a safer place.
Let's get Personal: Meet Khadija!
Learn more about Khadija, a member of our customer experience team who loves solving problems and helping customers get the most out of our product.
Know Your Business (KYB) 101
Learn what KYB is, why it matters, who needs it, and more.
How to build a Know Your Business (KYB) process
Learn what to consider when building a KYB process, what metrics to think about, what to look for in a KYB vendor, and more.
What does the Know Your Business (KYB) process look like?
Learn how businesses usually conduct KYB, why the process is often challenging, and more.
How corporate KYC can reduce fraud and increase trust
Discover what corporate KYC is and how it can protect your business.
Why does KYC matter for fintech companies?
Whether you offer a lending product or investing service, if you're a fintech company, you need to comply with KYC regulations.
How do AML regulations apply to crypto exchanges?
If your business operates in the crypto space, it’s critical that you understand the tenets of AML so you can take the requisite steps to meet regulatory requirements.
AML tools: What to look for in AML software
Learn about the different features you may want to look for as you build your AML toolkit.
Why automated adverse media screening is essential for AML
Negative news checks are an essential but complex process. Protect your business from reputational risk with an automated screening solution.
Global AML compliance: Is your business doing enough?
Discover some of the regulations and protocols you’ll need to know and remember when conducting business internationally
What is eKYC?
Take a look at the different signals that eKYC can take advantage of and review the benefits that eKYC offers both businesses and their customers.
Build onboarding flows that convert with Dynamic Flow
Customers like LedgerX and Coursera drive conversion at every screen with Dynamic Flow.
Let's get Personal: Meet David!
Learn more about David, our people operations business partner who loves to drive company-wide initiatives, but doesn’t have a license to drive a car.
KYC for online gaming (iGaming)
Learn about the KYC requirements that impact the online gaming (iGaming) industry, which includes online sports betting, poker betting, video game betting, and casino gaming.
What is the Bank Secrecy Act?
Learn about the Bank Secrecy Act's requirements and how the law could impact your business.
How to protect your business with automated sanctions screening
It’s illegal to do business with a sanctioned entity, but sanctions screening is complicated. Here’s how to protect your business & comply with AML regulations.
Onboard businesses faster with Persona's automated Know Your Business (KYB) solution
Get everything you need to automatically onboard, verify, and investigate the businesses you partner with and the individuals behind them.
The importance of KYC for online gambling
Learn more about the growing risks for online casinos and gambling apps, the evolving regulatory landscape, and what companies can do to stay compliant.
Let's get Personal: Meet Ali!
Learn more about Ali, one of our amazing solutions engineers who always has his hands tied up in a bunch of different projects.
Decentralized exchanges and KYC
It's important for decentralized exchanges to get ready for KYC and AML regulations now so they will be prepared if and when they find themselves subject to the rules.
What is KYB, and why does it matter?
If you work with other companies, you may be required to implement KYB verification. Learn more.
5 best practices for securing health data
Healthcare organizations must prioritize data security to protect patient information and ensure regulatory compliance. Learn how.
Should a private company own taxpayer data?
Recent controversies involving the IRS’s use of third-party ID verification service providers raise an important question: What’s the right way to handle identification of taxpayers online?
Cybercrime statistics worldwide
Cybercrime is more common than ever. Learn about the most common types of cybercrimes, most attacked industries, and more.
Reimagine your manual review process with Persona Cases
Cases gives your team a single place to control, customize, and optimize your entire manual review process.
NFT money laundering and AML compliance
Learn more about non-fungible tokens, why they're appealing to criminals, and how to reduce the risk of money laundering via NFTs.
What are issuing database verifications?
Issuing database verifications are one of the best ways to reduce fraud in your business. Learn more.
What will the post-Covid fraud landscape look like?
Learn about the risk areas anti-fraud professionals are most concerned about — and how to protect your business.
What is a politically exposed person (PEP)?
Learn what PEPs are, why your business should screen for them, and how Persona can help.
Identity verification: a crucial component of customer experience
Friction during IDV can create a poor user experience that can break trust with your customers. This is why IDV must fit each unique situation and user.
How to protect your business against synthetic fraud
Synthetic identity fraud is a fast-growing problem. Learn why it’s important and how to proactively guard your business against it before it’s too late.
Identity verification vs. identity authentication
Learn how each approach works, where they differ, and what role each plays in building consumer trust.
Top GDPR statistics businesses must know
GDPR is one of the most extensive regulations governing data collection. Learn who it affects, the types of data it covers, and more.
Let's get Personal: Meet Etra!
Learn more about Etra, our business talent lead, Formula 1 enthusiast, and unofficial Jeopardy host.
Top 3 challenges of identity verification — and how to solve them
Learn about the three main identity verification challenges businesses face — along with how to solve them.
Q&A with Cybernews: Using IDV to build trust
Persona CEO Rick Song chats with Cybernews about how identity verification solutions can deter fraud and be used to rebuild trust between companies and customers.
Let's get Personal: Meet Geet!
Learn more about Geet, a sales engineer at Persona who loves the Lakers, avocados, and selling tech.
Why you need a digital verification system for your business
Here’s what businesses need to know about the evolution, operation, and impact of digital verification.
What is anti-money laundering (AML), and why is it important?
Learn about the stages and harms of money laundering, key AML regulations, and how to meet constantly evolving compliance standards.
Let's get Personal: Meet Christie!
Learn more about Christie, a product designer at Persona who loves birds, board games, and talking to customers about how they use our products.
Social media and dating apps have a serious identity problem
It’s time for social media and dating apps to face the music and curb fraud, deception, and disinformation on their platforms once and for all.
Perpetual KYC: The future of customer due diligence
Perpetual KYC (pKYC) is one of the best ways to protect customers. Learn what it is, what it looks like, and why it's important.
Let's get Personal: Meet Zoey!
Get to know Zoey, a CSM team lead who loves coffee, yoga, and helping Persona's customers.
What the Consumer Privacy Rights Act (CPRA) means for your business
Learn how the Consumer Privacy Rights Act (CPRA) differs from the CCPA, the implications for your business, and how to prepare.
How to evaluate your KYC compliance
Learn what types of businesses are subject to KYC regulations, what it means to be KYC compliant, how to evaluate your compliance, and more.
Let's get Personal: Meet Melissa!
Meet Melissa, an engineering manager at Persona who loves building products that customers find useful... and boba.
Two-factor authentication (2FA) statistics
Businesses need to heighten up their security to keep their company and customers safe. One of the easiest measures to take — and simplest to set up — is 2FA.
What is Know Your Customer (KYC) — and why does it matter?
KYC and AML are regulations that require businesses to verify their customers’ identities. Here’s what you need to know.
Why businesses need to rethink identity online
The digital-first world is here to stay, and it's time for businesses to put the proper systems in place to protect the privacy and security of their users.
The AML compliance checklist: best practices, tools, and processes
In this AML checklist, we’ll briefly go over the five AML pillars, then dive into four processes that can help improve AML compliance.
How to implement the five pillars of AML compliance
Learn what a compliant AML program looks like and how to establish one at your company.
How we’re reducing AI bias at Persona to create a more human internet
Biometric verification isn’t perfect. Here's what we’re doing to address bias in AI-powered face recognition at Persona.
Subscribe to Verified with Persona
Learn more about new privacy regulations, KYC/AML, and how to improve the identity experience for users.