Susan Morrow

Contributor

Opinions expressed by ICN authors are their own.

Formerly a scientist working in the field of chemistry, Susan Morrow moved into the tech sector, co-founding an information security company in the early 1990s. She have worked in the field of cybersecurity and digital identity since then and helped to create award winning security solutions used by enterprises across the world.

Susan currently works on large scale, citizen and consumer identity systems. Her focus is on balancing usability with security. She has helped to build identity solutions that are cutting edge and expanding the boundaries of how identity ecosystems are designed. She has worked on a number of government based projects in the EU and UK. She is also interested in the human side of cybersecurity and how our own behavior influences the cybercriminal.

The opinions expressed in this blog are those of Susan Morrow and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Digital identity, the blockchain and the GDPR: A round peg in a square hole?

Can digital identity cure the chronically ill?

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

How identity layering improves data flow

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

Is it time to drop our identity to become frictionless?

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

Building relationships using digital identity

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

DAM if you do and DAM if you don’t

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

Security versus usability a conundrum in modern identity management?

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

The costs, the privacy and the security of IAM and personal data sharing

The costs, the privacy and the security of IAM and personal data sharing

Resolving the issues of data storage and security when implementing life management platforms.

Feeling secure enough to use open source for IAM projects

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

Will WebAuthn replace passwords or not?

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

Can we use a social media model to improve privacy attitudes?

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

How the Facebook privacy debacle is connected to the movement of IAM to containers

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

Load More