Susan Morrow

Contributor

Opinions expressed by ICN authors are their own.

Formerly a scientist working in the field of chemistry, Susan Morrow moved into the tech sector, co-founding an information security company in the early 1990s. She have worked in the field of cybersecurity and digital identity since then and helped to create award winning security solutions used by enterprises across the world.

Susan currently works on large scale, citizen and consumer identity systems. Her focus is on balancing usability with security. She has helped to build identity solutions that are cutting edge and expanding the boundaries of how identity ecosystems are designed. She has worked on a number of government based projects in the EU and UK. She is also interested in the human side of cybersecurity and how our own behavior influences the cybercriminal.

The opinions expressed in this blog are those of Susan Morrow and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Feeling secure enough to use open source for IAM projects

Will WebAuthn replace passwords or not?

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

Can we use a social media model to improve privacy attitudes?

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

How the Facebook privacy debacle is connected to the movement of IAM to containers

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

The cloud’s the limit for secure, compliant identity storage and personal data

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

What happens if... disaster recovery for the smart city and beyond

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

Data as a smart superstructure: a warning to the wise

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

Identity and the smart city

Identity and the smart city

IAMs next big outing.

Is privacy the new security?

Is privacy the new security?

Privacy will become the next big issue for identity data architects and individuals alike.

Privacy and metrics of testing and staging environments

Privacy and metrics of testing and staging environments

Why data privacy should be respected throughout testing as well as production.

May the forces be with you: using IPaaS for IAM and GDPR

May the forces be with you: using IPaaS for IAM and GDPR

Getting your head around GDPR with some new tools of the trade.

Microservices for IAM: container security and personal data

Microservices for IAM: container security and personal data

Using containers and microservices to provide better IAM.

Load More