Identity management in digital health: protecting patient identities
How can organizations protect their patients and secure private health information? Learn how to master identity management in healthcare.
Why to assemble a trust and safety team for your organization
With instances of fraud on the rise, it's paramount for organizations to assemble trust and safety teams that are equipped to meet modern security demands.
Why your business needs flexible identity infrastructure
Identity verification isn’t one-size-fits-all. Learn how a flexible identity infrastructure can help your business be more resilient.
What is the INFORM Consumers Act?
The INFORM Consumers Act and SHOP Safe Act are two bills aimed at restricting online shopping fraud. Learn how they could impact businesses.
How device fingerprinting catches suspicious actors
Device fingerprinting is an effective way for organizations to catch suspicious actors in their tracks. Learn how you can apply it.
Link analysis: How can it help you spot fraud?
Link analysis is a method of analyzing data that allows you to study relationships that aren't visible in raw data. Learn more.
NFC e-passport verification guide
NFC technology allows for a more secure identity verification process while improving usability. Learn how it works.
How match requirements allow you to fine-tune your IDV processes
Setting name match requirements is an important part of the identity verification process. Learn more about why it’s important to get them right.
What is account creation fraud?
Learn what account creation fraud is, what it can look like, how it typically works, and how to protect your business and legitimate users.
Red Flags Rule: Your business’s role in preventing identity theft
The Red Flags Rule requires businesses to create a plan to identify and prevent identity theft. Find out who this rule applies to and how to comply.
What are suspicious activity reports (SARs)?
Financial institutions must use suspicious activity reports (SARs) to report questionable activity to the appropriate body for legal investigation
New at Persona: Mobile driver's license (mDL) verification via Apple Wallet
Organizations that obtain Apple's entitlement will be able to accept mobile driver’s licenses (mDLs) as a form of identification within Persona’s verification flow.
What is identity verification (IDV)?
Learn what IDV is, explore how it works, and take a look at the different types of identity verification you may choose to leverage in your business.
Mobile driver’s licenses (mDLs) and your business
Take a closer look at what mobile driver’s licenses are, how they work, and the use cases they may present for your business.
What is Combating the Financing of Terrorism (CFT)?
By implementing procedures to combat the financing of terrorism, you can protect customers and help make the world a safer place.
What is selfie identity verification, and how does it work?
Learn about selfie identity verification and liveness detection, how they work together, the challenges they address, and their shortcomings.
Let's get Personal: Meet Khadija!
Learn more about Khadija, a member of our customer experience team who loves solving problems and helping customers get the most out of our product.
How to build a Know Your Business (KYB) process
Learn what to consider when building a KYB process, what metrics to think about, what to look for in a KYB vendor, and more.
Know Your Business (KYB) 101
Learn what KYB is, why it matters, who needs it, and more.
How do AML regulations apply to crypto exchanges?
If your business operates in the crypto space, it’s critical that you understand the tenets of AML so you can take the requisite steps to meet regulatory requirements.
Why does KYC matter for fintech companies?
Whether you offer a lending product or investing service, if you're a fintech company, you need to comply with KYC regulations.
AML tools: What to look for in AML software
Learn about the different features you may want to look for as you build your AML toolkit.
Why automated adverse media screening is essential for AML
Negative news checks are an essential but complex process. Protect your business from reputational risk with an automated screening solution.
Global AML compliance: Is your business doing enough?
Discover some of the regulations and protocols you’ll need to know and remember when conducting business internationally
What is eKYC?
Take a look at the different signals that eKYC can take advantage of and review the benefits that eKYC offers both businesses and their customers.
Let's get Personal: Meet David!
Learn more about David, our people operations business partner who loves to drive company-wide initiatives, but doesn’t have a license to drive a car.
KYC for online gaming (iGaming)
Learn about the KYC requirements that impact the online gaming (iGaming) industry, which includes online sports betting, poker betting, video game betting, and casino gaming.
How to protect your business with automated sanctions screening
It’s illegal to do business with a sanctioned entity, but sanctions screening is complicated. Here’s how to protect your business & comply with AML regulations.
What is the Bank Secrecy Act?
Learn about the Bank Secrecy Act's requirements and how the law could impact your business.
The importance of KYC for online gambling
Learn more about the growing risks for online casinos and gambling apps, the evolving regulatory landscape, and what companies can do to stay compliant.
Let's get Personal: Meet Ali!
Learn more about Ali, one of our amazing solutions engineers who always has his hands tied up in a bunch of different projects.
Decentralized exchanges and KYC
It's important for decentralized exchanges to get ready for KYC and AML regulations now so they will be prepared if and when they find themselves subject to the rules.
What is KYB, and why does it matter?
If you work with other companies, you may be required to implement KYB verification. Learn more.
5 best practices for securing health data
Healthcare organizations must prioritize data security to protect patient information and ensure regulatory compliance. Learn how.
Should a private company own taxpayer data?
Recent controversies involving the IRS’s use of third-party ID verification service providers raise an important question: What’s the right way to handle identification of taxpayers online?
Cybercrime statistics worldwide
Cybercrime is more common than ever. Learn about the most common types of cybercrimes, most attacked industries, and more.
NFT money laundering and AML compliance
Learn more about non-fungible tokens, why they're appealing to criminals, and how to reduce the risk of money laundering via NFTs.
What are issuing database verifications?
Issuing database verifications are one of the best ways to reduce fraud in your business. Learn more.
What will the post-Covid fraud landscape look like?
Learn about the risk areas anti-fraud professionals are most concerned about — and how to protect your business.
What is a politically exposed person (PEP)?
Learn what PEPs are, why your business should screen for them, and how Persona can help.
Identity verification: a crucial component of customer experience
Friction during IDV can create a poor user experience that can break trust with your customers. This is why IDV must fit each unique situation and user.
How to protect your business against synthetic fraud
Synthetic identity fraud is a fast-growing problem. Learn why it’s important and how to proactively guard your business against it before it’s too late.
Identity verification vs. identity authentication
Learn how each approach works, where they differ, and what role each plays in building consumer trust.
Top GDPR statistics businesses must know
GDPR is one of the most extensive regulations governing data collection. Learn who it affects, the types of data it covers, and more.
Let's get Personal: Meet Etra!
Learn more about Etra, our business talent lead, Formula 1 enthusiast, and unofficial Jeopardy host.
Let's get Personal: Meet Geet!
Learn more about Geet, a sales engineer at Persona who loves the Lakers, avocados, and selling tech.
Q&A with Cybernews: Using IDV to build trust
Persona CEO Rick Song chats with Cybernews about how identity verification solutions can deter fraud and be used to rebuild trust between companies and customers.
What is anti-money laundering (AML), and why is it important?
Learn about the stages and harms of money laundering, key AML regulations, and how to meet constantly evolving compliance standards.
Let's get Personal: Meet Christie!
Learn more about Christie, a product designer at Persona who loves birds, board games, and talking to customers about how they use our products.
Perpetual KYC: The future of customer due diligence
Perpetual KYC (pKYC) is one of the best ways to protect customers. Learn what it is, what it looks like, and why it's important.
Social media and dating apps have a serious identity problem
It’s time for social media and dating apps to face the music and curb fraud, deception, and disinformation on their platforms once and for all.
Let's get Personal: Meet Zoey!
Get to know Zoey, a CSM team lead who loves coffee, yoga, and helping Persona's customers.
How to evaluate your KYC compliance
Learn what types of businesses are subject to KYC regulations, what it means to be KYC compliant, how to evaluate your compliance, and more.
Let's get Personal: Meet Melissa!
Meet Melissa, an engineering manager at Persona who loves building products that customers find useful... and boba.
Two-factor authentication (2FA) statistics
Businesses need to heighten up their security to keep their company and customers safe. One of the easiest measures to take — and simplest to set up — is 2FA.
What is Know Your Customer (KYC) — and why does it matter?
KYC and AML are regulations that require businesses to verify their customers’ identities. Here’s what you need to know.
The AML compliance checklist: best practices, tools, and processes
In this AML checklist, we’ll briefly go over the five AML pillars, then dive into four processes that can help improve AML compliance.
Why businesses need to rethink identity online
The digital-first world is here to stay, and it's time for businesses to put the proper systems in place to protect the privacy and security of their users.
The next era of moderation will be verified
Verification isn't just a blue checkmark — it's an increasingly important tool in moderation efforts to combat nefarious issues like harassment and hate speech.
How to incorporate age verification into your business
Any business that sells age-restricted products, provides access to age-gated activities, or delivers services that require adult consent must verify ages. Learn more.
How to enhance your identity verification decisions with AAMVA checks
AAMVA verification is an effective tool against fraud, but it has tradeoffs, too. Discover the benefits and drawbacks — and how Persona can help.
Announcing Persona’s $150M Series C
We've raised a $150M Series C to continue growing our identity infrastructure platform built to support real people, not user IDs.
What is account takeover fraud?
Account takeover fraud can negatively impact both your customers and business. Learn what it is, how to prevent it, and more.
Designing an app builder with server-driven UI
Making the Persona app more configurable wasn't enough — we had to design and construct an app builder.
The unconventional way we built an award-winning team
Our approach to finding great talent isn’t for everyone, but we’re incredibly proud of the team we’ve built and look forward to this next chapter of growth.
Deepfakes: The new face of fraud
Learn how deepfakes work, where they came from, what risk they pose to your business, and more.
Introducing Workflows: automations for any use case
From setting custom rules to triggering actions, Workflows is a flexible, intuitive, and powerful way to automate your identity processes and more.
Our Series B and the future of Persona
We’ve raised $50 million to bring us one step closer to becoming the identity layer of the internet.
New age of data privacy regulation: How businesses can prepare
It’s only a matter of time before new data privacy regulation is passed, so it’s pertinent that businesses prepare before it’s too late.