Questions? Call us today: (516) 778-5639

authID Home
authID Home

Jeff Scheidel, VP of Operations, authID

Home » Archives for Jeff Scheidel, VP of Operations, authID
CHEAP FAKES ARE NOW DEEP FAKES

CHEAP FAKES ARE NOW DEEP FAKES

One rite of passage for baby boomers was faking their way into a bar while underage. If you couldn’t borrow somebody else’s license that kinda looked like you (and which would fool the bouncer) then the alternative was getting a fake id. This typically meant modifying...

Robots Are Stealing My Stuff

Robots Are Stealing My Stuff

How The Threat Of AI Is Now, Not Later, And The Way To Fight It Many years ago, Steve Martin did a comedy bit on Saturday Night Live in which he joked about how people thought he was crazy for thinking that robots were stealing his luggage. But all these years later,...

Can We Talk? I Only Need 700 Milliseconds of Your Time

Can We Talk? I Only Need 700 Milliseconds of Your Time

Sure, I’m old, but everybody I hang with complains I walk too fast. They can’t keep up. My wife is always telling me to slow down, they won’t run out of beer before we get there, wherever we’re heading.  I figure, I’m not going to live forever, so I want to get in as...

How Do I Trust Thee? Let Me Count the Ways

How Do I Trust Thee? Let Me Count the Ways

WHY THE ROOT OF TRUST ABSOLUTELY MATTERS FOR DIGITAL ACCESS Shakespeare said “a rose by any other name would smell as sweet,” saying that he would adore Juliet no matter her last name. Alas, our digital world doesn’t look that way. If the name, the SSN, the physical...

authID 2nd Annual Fintech Cybersecurity Survey Report

authID 2nd Annual Fintech Cybersecurity Survey Report

authID is pleased to share the results of its Second Annual Fintech Cybersecurity Survey, conducted to assess prevailing attitudes and perceptions on identity authentication solutions and uncover data-driven insights about current and emerging trends in enterprise...

Addressing the Human Element of Security Breaches

Addressing the Human Element of Security Breaches

Social engineering attacks exploiting legacy Multi-Factor Authentication (MFA) technology have been successful in compromising Twilio, Cisco, Intuit, and other enterprises, this summer. Even as CISOs and IAM Architects supplement passwords with MFA, hackers are...

authID Set Up a Quick, Free Biometric Demo Form Photo