
Susan Morrow
Contributor
Formerly a scientist working in the field of chemistry, Susan Morrow moved into the tech sector, co-founding an information security company in the early 1990s. She have worked in the field of cybersecurity and digital identity since then and helped to create award winning security solutions used by enterprises across the world.
Susan currently works on large scale, citizen and consumer identity systems. Her focus is on balancing usability with security. She has helped to build identity solutions that are cutting edge and expanding the boundaries of how identity ecosystems are designed. She has worked on a number of government based projects in the EU and UK. She is also interested in the human side of cybersecurity and how our own behavior influences the cybercriminal.
The opinions expressed in this blog are those of Susan Morrow and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.


May the forces be with you: using IPaaS for IAM and GDPR
Getting your head around GDPR with some new tools of the trade.

Microservices for IAM: container security and personal data
Using containers and microservices to provide better IAM.

Credential recovery: disaster recovery for the consumer
The question is, help desk vs. self-service?

Image management in identity management: a picture paints a thousand words
Image management can give us the tools to secure and optimize image-based PII.

Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen?
The story of a blockchain that may not break, but will bend.

When big data gets personal...and cloudy
What are the considerations for security and scalability when choosing cloud storage for identity platforms that service multiple millions, even billions of users?

Authenticating your customers: the tripartite of consumer authentication
Things to consider when choosing which authentication options to offer in identity systems for wide demographics. How the mix of security, usability, and customer attitude affects that choice.

Identity data in the world of GDPR
The GDPR says that “The processing of personal data should be designed to serve mankind.“ How CIAM identity systems can help serve some of the privacy requirements of GDPR.

Another day, another case of Grand Theft Data. Can a verified ID save the day?
How verified consumer identity can prevent mass-hacks like Equifax and others. Verified identity can be used alongside other technologies – such as blockchain, and anonymization – to prevent the exposure of data across multiple online...

When identity data eclipses digital identity
Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in...

Hacking the GDPR
Using anonymization and pseudonymization to reduce the overhead of GDPR compliance.

The road to APIness in customer identity
Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

The thorny issue of verifying humans
Customer identity access management and how verification of users is not working. A look at the concept of levels of assurance (LOA) as an integer based system that needs a rethink. How probability based identity is the way forward....