Prove’s Mary Ann Miller Explores Mobile Driver's Licenses for ID Verification on ISMG


In a recent video interview with Information Security Media Group (ISMG), Prove's Fraud and Cybercrime Executive Advisor, Mary Ann Miller, delved into the dynamic landscape of identity verification. With a particular focus on the potential vulnerabilities posed by counterfeit driver's licenses in the hands of fraudsters, Miller advocates for a shift towards electronic identification stored on mobile devices.
Miller anticipates a transformative shift in the conversation in 2024, where mobile driver's licenses transcend their traditional role, becoming versatile tools beyond mere driving credentials. She envisions a future where a robust real ID process seamlessly integrates into our digital identity verification processes.
Key discussion points:
- Identity Fraud Trends for 2024: The evolving trends shaping the landscape of identity fraud
- Authentication Signals: Understand the various signals crucial for bolstering authentication processes in the digital realm.
- Synthetic Identity Fraud Evolution: Predictions on the future developments within the synthetic identity fraud space.
For a comprehensive overview of the interview, don't miss the full video conversation with Mary Ann Miller.

Keep reading
Read the article: The Death of the OTP: Why Legacy MFA is Failing the Modern ConsumerDiscover why legacy MFA is failing and how Prove Unified Authentication provides a smarter, frictionless alternative. Learn how to replace insecure SMS OTPs with continuous, multi-layered identity assurance that prevents fraud while boosting conversion rates.
Read the article: Prove Launches ProveX℠, the Internet’s First Digital Trust ExchangeProve launches ProveX, ProveX, a new digital trust exchange that enables enterprises to instantly access verified data and credentials from partners, while preserving trust through every interaction
Read the article: Beyond the OTP: Why SMS-Based 2FA Is Failing and What Comes NextExplore the classic conflict between security measures and user friction.