Susan Morrow

Contributor

Want to Join?
Opinions expressed by ICN authors are their own.

Formerly a scientist working in the field of chemistry, Susan Morrow moved into the tech sector, co-founding an information security company in the early 1990s. She have worked in the field of cybersecurity and digital identity since then and helped to create award winning security solutions used by enterprises across the world.

Susan currently works on large scale, citizen and consumer identity systems. Her focus is on balancing usability with security. She has helped to build identity solutions that are cutting edge and expanding the boundaries of how identity ecosystems are designed. She has worked on a number of government based projects in the EU and UK. She is also interested in the human side of cybersecurity and how our own behavior influences the cybercriminal.

The opinions expressed in this blog are those of Susan Morrow and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

What the use of open banking means for identity networks

Why COVID-19 will change identity management forever

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

4 key problems with digital identity and why we need a new approach

4 key problems with digital identity and why we need a new approach

To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.

What's ahead for digital identity in 2020?

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

4 authentication use cases: Which protocol to use?

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

Deepfakes and synthetic identity: More reasons to worry about identity theft

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Is the digital identity layer missing or just misplaced?

Is the digital identity layer missing or just misplaced?

The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers.

Can the re-use of identity data be a silver bullet for industry?

Can the re-use of identity data be a silver bullet for industry?

The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen.

Using citizen IDs for commercial services will take an identity ecosystem

Using citizen IDs for commercial services will take an identity ecosystem

Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

Self-sovereign identity: 3 key questions

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

Have we reached peak privacy? How good IAM and privacy can coexist

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management.

15 secure coding practices to use in digital identity

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

Load More