
Blog, September 16, 2021
Phonexia's team of voice biometrics researchers attended the VoxCeleb Speaker Recognition Challenge 2021 and developed an innovative self-supervised speaker verification system.
Blog, September 16, 2021
Phonexia's team of voice biometrics researchers attended the VoxCeleb Speaker Recognition Challenge 2021 and developed an innovative self-supervised speaker verification system.
Blog, September 9, 2021
These days, businesses can choose from many types of authentication methods. What are the pros and cons of using today's highly popular biometric authentication methods?
Blog, August 31, 2021
Massive digitalization in recent years has given cybercriminals considerable opportunities to deploy their scamming strategies. What is the most popular fraud that contact centers need to tackle in 2021?
Blog, August 25, 2021
Passive voice biometrics plays a key role in providing a seamless contact center experience. What are the biggest reasons for having passive voice biometric authentication implemented in a contact center?
Blog, August 9, 2021
Voice biometric verification has been around for a long time now. As it is being used across many industries, what are the most common myths surrounding this frictionless type of authentication?
Blog, July 23, 2021
Voice biometric authentication is becoming increasingly popular in the world of voice-enabled services. How much does it affect the customer experience by its frictionless nature?
Blog, July 21, 2021
Tomáš Kučera joins Phonexia as the new Head of the Business Unit for Government to expand Phonexia's business in the public safety sector with his more than 20 years of experience in security sotware sales.
Blog, July 13, 2021
Voice biometrics has been around for a while, improving security and customer experiences all around the world. But what is the difference between active and passive voice biometrics?
Blog, June 24, 2021
Vishing has become an increasingly popular type of cybercrime these days. Is there a way to use voice biometrics and reduce the impact of such social engineering attacks?