Using citizen IDs for commercial services will take an identity ecosystem

Using citizen IDs for commercial services will take an identity ecosystem

Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

04/25/2019

Self-sovereign identity: 3 key questions

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

03/15/2019

Have we reached peak privacy? How good IAM and privacy can coexist

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management.

02/11/2019

15 secure coding practices to use in digital identity

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

01/25/2019

Women in identity management: 4 newcomers to watch

Women in identity management: 4 newcomers to watch

Identity management veterans Diana Volere, Diane Joyce, Eve Maler and Susan Morrow introduce you to new entrants in the field.

01/11/2019

Digital identity, the blockchain and the GDPR: A round peg in a square hole?

Digital identity, the blockchain and the GDPR: A round peg in a square hole?

Can an immutable record and GDPR data subject rights co-exist? Why blockchain might not be able to deliver on data privacy requirements.

11/16/2018

Can digital identity cure the chronically ill?

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

10/01/2018

How identity layering improves data flow

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

09/14/2018

Is it time to drop our identity to become frictionless?

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

08/30/2018

Building relationships using digital identity

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

08/14/2018

DAM if you do and DAM if you don’t

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

07/17/2018

Security versus usability a conundrum in modern identity management?

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

07/03/2018

The costs, the privacy and the security of IAM and personal data sharing

The costs, the privacy and the security of IAM and personal data sharing

Resolving the issues of data storage and security when implementing life management platforms.

06/19/2018

Feeling secure enough to use open source for IAM projects

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

05/30/2018

Will WebAuthn replace passwords or not?

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

05/15/2018

Can we use a social media model to improve privacy attitudes?

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

04/10/2018

How the Facebook privacy debacle is connected to the movement of IAM to containers

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

03/27/2018

The cloud’s the limit for secure, compliant identity storage and personal data

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

03/07/2018

What happens if... disaster recovery for the smart city and beyond

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

02/20/2018

Data as a smart superstructure: a warning to the wise

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

02/14/2018

Load More