ClickCease

Prove Blog

Discover industry insights, deep dives, product updates, and more.

Read our external blog article: Prove’s State of Identity Report Highlights the New Rules of Digital TrustRead our blog article: Prove’s State of Identity Report Highlights the New Rules of Digital Trust
Blog

Prove’s State of Identity Report Highlights the New Rules of Digital Trust

Prove’s State of Identity Report explores why traditional point-in-time verification is failing and how businesses can transition to a continuous, persistent identity model to reduce fraud and improve user experience.

Latest blogs

All Posts
Read our blog article: Prove Wins ‘Best Company Outlook’ and ‘Best Places to Work’ in Comparably AwardsRead our external blog article: Prove Wins ‘Best Company Outlook’ and ‘Best Places to Work’ in Comparably Awards
Company News
Prove Wins ‘Best Company Outlook’ and ‘Best Places to Work’ in Comparably Awards
Prove Wins ‘Best Company Outlook’ and ‘Best Places to Work’ in Comparably Awards

Leading digital identity technology company Prove recognized for most promising future and best work environment for its employees

Read our blog article: The UK Digital Identity and Attributes Trust Framework – Could This Be the Holy Grail of Digital Identity?Read our external blog article: The UK Digital Identity and Attributes Trust Framework – Could This Be the Holy Grail of Digital Identity?
Blog
The UK Digital Identity and Attributes Trust Framework – Could This Be the Holy Grail of Digital Identity?
The UK Digital Identity and Attributes Trust Framework – Could This Be the Holy Grail of Digital Identity?

The UK Digital Identity and Attributes Trust Framework details the principles, policies, and standards that must be followed by organizations providing or using digital identity services.

Read our blog article: How Banks & Regulators Are Applying Machine LearningRead our external blog article: How Banks & Regulators Are Applying Machine Learning
Blog
How Banks & Regulators Are Applying Machine Learning
How Banks & Regulators Are Applying Machine Learning

Here are some interesting examples of machine learning applications in banking.

Read our blog article: The Good, The Bad, and The Ugly about Apple PayRead our external blog article: The Good, The Bad, and The Ugly about Apple Pay
Blog
The Good, The Bad, and The Ugly about Apple Pay
The Good, The Bad, and The Ugly about Apple Pay

Apple Pay has delivered many good things. But there are dark clouds on the horizon.

FinTechRead our blog article: What Makes FinTech a Vital Element of the International Ecosystem? [Infographic]FinTechRead our external blog article: What Makes FinTech a Vital Element of the International Ecosystem? [Infographic]
Blog
What Makes FinTech a Vital Element of the International Ecosystem? [Infographic]
What Makes FinTech a Vital Element of the International Ecosystem? [Infographic]

Investments in FinTech have grown exponentially in the past decade – rising from $1.8 billion in 2010 to $19 billion in 2015.

Read our blog article: The Next Level of Authentication: Vein RecognitionRead our external blog article: The Next Level of Authentication: Vein Recognition
Blog
The Next Level of Authentication: Vein Recognition
The Next Level of Authentication: Vein Recognition

‍Biometrics has been gaining popularity in the financial services industry worldwide. The biometrics market is expected to reach a value of $30 billion by 2021.

Read our blog article: How to Prevent Mobile Payments FraudRead our external blog article: How to Prevent Mobile Payments Fraud
Blog
How to Prevent Mobile Payments Fraud
How to Prevent Mobile Payments Fraud

The value of fraudulent online transactions is expected to grow from $10.7 billion last year to $25.6 billion in 2020.

Read our blog article: ​​Why Electronic Payments Are the Key to Economic GrowthRead our external blog article: ​​Why Electronic Payments Are the Key to Economic Growth
Blog
​​Why Electronic Payments Are the Key to Economic Growth
​​Why Electronic Payments Are the Key to Economic Growth

Electronic payments globally are being adopted at an outstanding pace combined with rapid technology development and digital experience improvement.

Read our blog article: Social Engineering Attacks: Things One Should Know to Avoid Payment ScamsRead our external blog article: Social Engineering Attacks: Things One Should Know to Avoid Payment Scams
Blog
Social Engineering Attacks: Things One Should Know to Avoid Payment Scams
Social Engineering Attacks: Things One Should Know to Avoid Payment Scams

Social engineering refers to psychologically manipulating people to make them act or divulge information.

API bankingRead our blog article: Silicon Valley Bank Buys Standard Treasury to Build the Future of API Banking ServicesAPI bankingRead our external blog article: Silicon Valley Bank Buys Standard Treasury to Build the Future of API Banking Services
Silicon Valley Bank Buys Standard Treasury to Build the Future of API Banking Services
Silicon Valley Bank Buys Standard Treasury to Build the Future of API Banking Services

Silicon Valley Bank, the bank of the world’s most innovative companies, announced it had acquired the assets and team from startup company Standard Treasury to accelerate the development of its banking services APIs.

Read our blog article: How Can Banks Survive the Digital Wallet War Against GAFA?Read our external blog article: How Can Banks Survive the Digital Wallet War Against GAFA?
Blog
How Can Banks Survive the Digital Wallet War Against GAFA?
How Can Banks Survive the Digital Wallet War Against GAFA?

With the implementation of PSD2 in Europe, banks’ monopoly on their customer’s account information will likely disappear.

Read our blog article: How to Fight the Menace of Rising SIM Swap Fraud in the UKRead our external blog article: How to Fight the Menace of Rising SIM Swap Fraud in the UK
Blog
How to Fight the Menace of Rising SIM Swap Fraud in the UK
How to Fight the Menace of Rising SIM Swap Fraud in the UK

SIM Swap, also known as SIM Splitting or SIM jacking is a fraudulent activity, where a fraudster takes complete control of users’ phone accounts by either porting or cloning their SIM without their knowledge.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.