Upcoming Events
One of the biggest challenges to adopting integrated border management strategies is identifying, collecting, and verifying all available data for use in risk assessment and management at the border in an expeditious manner. This information exists in many sources and legacy systems, often siloed across border security ...
Archived Events
In today's world, where international tensions are high and the threat of adversarial action looms large, the need for accurate and timely intelligence has become more critical than ever before. In this context, publicly available information (PAI) has become an integral part of filling gaps in intelligence collection ...
While the U.S. federal government is developing and adopting new technologies at an unprecedented pace, it’s still challenging to capitalize on emerging technologies from the commercial sector without loosening critical security and compliance controls. ...
One of the fundamental tasks of natural language processing (NLP) is to determine whether two words have a similar meaning to one another, and how closely they are related. Why would you need this? If you were analyzing threat reports, you'd want to be altered to the word "bomb," but ...
Economic uncertainty has created a perfect storm for an increase in financial crimes. For organizations that are still performing AML/KYC compliance checks without assistance from articiial intelligence (AI), the time has come to rethink that unsustainable approach. Financial criminals have long been using AI to attack ...
Name matching can be tricky - especially if you're not familiar with its intricacies, like nicknames or transliteration errors which are common when dealing with foreign languages. For organizations and government agencies with critical name matching requirements, like screening against sanctioned party lists, errors could ...