NIST IAL2 Identity Verification An Updated Review of Requirements

Four parts of NIST 800-63 include identity guidelines, identity proofing, authentication, and federation documents. The NIST page provides a good overview of each section, and you can explore the guidelines for granular details further. As each covers a massive amount of information, we will only select the 800-63A, titled Enrollment and Identity Proofing. Trust Swiftly fits perfectly in this section, and we have meticulously built our tool to comply with this requirement.

Read More
Fortifying Gaps in KYC Defenses

If anyone has been paying attention in the past few months, they will realize that most KYC protections have been breached at this point. The gates are wide open, and fraudsters encourage the peasants to pillage the castles. YouTube and other social media platforms are doing nothing or acting too late to slow down the training of fledgling fraudsters.

Read More
How to identify fake employees and candidates?

Recently, companies have been facing an uptick in fraud and other employment attacks that put them at risk. HR, recruiting, and people teams face immense numbers of candidates and typically lack the tools, processes, and availability to thoroughly vet potential new and existing employees.

Read More
Protecting SBA Business Loans from Fraud

The SBA, a lifeline for many small businesses, is under siege from fraudsters. The urgency of the situation is clear when we see them pouncing on new programs and even disaster funds. A quick scan of Telegram reveals half a million in likely illegal disbursements, just the tip of the iceberg.

Read More
Best Stripe Radar Fraud Strategy

The following post will review strategies for Radar as an overall product and then for Stripe users on managing fraud efficiently. Throughout the years, Stripe Radar has grown to become a comprehensive product with improved risk scores and continues to add features.

Read More
The Downsides to Decentralized Identity and SSI

Decentralized identity will become significant in identity proofing and verification in the coming years. There are plenty of explainers and deep dives into the technology and why companies and people should pay attention to it. It is still a fragmented space, but new iterations are slowly improving and standardizing the solutions.

Read More
Securing Employee Onboarding with KYE for IAM

Understanding the significance of 'Know Your Employee' (KYE) in onboarding is becoming the next level of security in IAM. Recently, remote employees and contractors are a weak link in the security of a business. In one case, North Korea has targeted businesses with inside employees that decide to earn salaries, exfiltrate information, or remain sleeping agents until needed.

Read More
GenAI AML Guide to Discreetly Bypass Compliance

As most companies and bad actors are now using AI against each other, there has not been too much exposure of methods used in bypasses. We have covered some KYC and deepfake vulnerabilities, but the fraud world doesn't stop with just one component. Companies are racing to create their own AI agents to help automate and detect more AML and KYC checks.

Read More
Identity Verification Pricing Comparison and Alternatives

In 2025, identity verification software has expanded across industries, and more companies are utilizing these services. Around five years ago, many solutions did not exist, and there were only a few options on the market to verify an ID. Even worse, they were manual, slow, costly, and challenging to implement.

Read More
Countering AI-Generated Attacks with Human-Built Innovation

As more AI models and tools are released into the wild, they are becoming visually realistic and easier to use. When a model becomes optimized to run on lower-end hardware and meets realistic capabilities, it starts to gain critical mass to be used for fraud.

Read More