How to identify fake employees and candidates?

Recently, companies have been facing an uptick in fraud and other employment attacks that put them at risk. HR, recruiting, and people teams face immense numbers of candidates and typically lack the tools, processes, and availability to thoroughly vet potential new and existing employees.

Read More
Protecting SBA Business Loans from Fraud

The SBA, a lifeline for many small businesses, is under siege from fraudsters. The urgency of the situation is clear when we see them pouncing on new programs and even disaster funds. A quick scan of Telegram reveals half a million in likely illegal disbursements, just the tip of the iceberg.

Read More
Best Stripe Radar Fraud Strategy

The following post will review strategies for Radar as an overall product and then for Stripe users on managing fraud efficiently. Throughout the years, Stripe Radar has grown to become a comprehensive product with improved risk scores and continues to add features.

Read More
The Downsides to Decentralized Identity and SSI

Decentralized identity will become significant in identity proofing and verification in the coming years. There are plenty of explainers and deep dives into the technology and why companies and people should pay attention to it. It is still a fragmented space, but new iterations are slowly improving and standardizing the solutions.

Read More
Securing Employee Onboarding with KYE for IAM

Understanding the significance of 'Know Your Employee' (KYE) in onboarding is becoming the next level of security in IAM. Recently, remote employees and contractors are a weak link in the security of a business. In one case, North Korea has targeted businesses with inside employees that decide to earn salaries, exfiltrate information, or remain sleeping agents until needed.

Read More
GenAI AML Guide to Discreetly Bypass Compliance

As most companies and bad actors are now using AI against each other, there has not been too much exposure of methods used in bypasses. We have covered some KYC and deepfake vulnerabilities, but the fraud world doesn't stop with just one component. Companies are racing to create their own AI agents to help automate and detect more AML and KYC checks.

Read More
Identity Verification Pricing Comparison and Alternatives

In 2025, identity verification software has expanded across industries, and more companies are utilizing these services. Around five years ago, many solutions did not exist, and there were only a few options on the market to verify an ID. Even worse, they were manual, slow, costly, and challenging to implement.

Read More
Countering AI-Generated Attacks with Human-Built Innovation

As more AI models and tools are released into the wild, they are becoming visually realistic and easier to use. When a model becomes optimized to run on lower-end hardware and meets realistic capabilities, it starts to gain critical mass to be used for fraud.

Read More
The future of identity verification in the world of AI and post-AGI

As technology advances, there is no slowdown in bad actors taking advantage of tools to commit crimes. Now, with more advanced AI entering the stage with vast capabilities, the barriers to entry for many identity verification bypass methods are being lowered.

Read More
A Guide for Professional P2P Crypto Merchants and Vendors Collecting KYC

We recently assisted a P2P crypto vendor that was facing major losses due to buyers on a P2P marketplace. They faced significant chargebacks and bank recalls from verified buyers with positive reviews. Unfortunately, many fiat payment methods are easily disputable by a buyer if they complain to their bank or financial institution.

Read More