
4 authentication use cases: Which protocol to use?
Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

Deepfakes and synthetic identity: More reasons to worry about identity theft
How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Is the digital identity layer missing or just misplaced?
The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers.

Can the re-use of identity data be a silver bullet for industry?
The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen.

Using citizen IDs for commercial services will take an identity ecosystem
Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

Self-sovereign identity: 3 key questions
SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

Have we reached peak privacy? How good IAM and privacy can coexist
Why privacy needs to remain at the forefront of identity and access management.

15 secure coding practices to use in digital identity
Secure coding of any application or service is important, but it is vital in systems that process personal data.

Women in identity management: 4 newcomers to watch
Identity management veterans Diana Volere, Diane Joyce, Eve Maler and Susan Morrow introduce you to new entrants in the field.

Digital identity, the blockchain and the GDPR: A round peg in a square hole?
Can an immutable record and GDPR data subject rights co-exist? Why blockchain might not be able to deliver on data privacy requirements.

Can digital identity cure the chronically ill?
A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

How identity layering improves data flow
The layered approach for security is dead. Long live layered digital identity and identity in depth.

Is it time to drop our identity to become frictionless?
How the data behind the identity is driving services and will help move us away from knowledge-based verification.

Building relationships using digital identity
The how and why of building an identity platform based on reciprocal altruism.

DAM if you do and DAM if you don’t
How Digital Asset Management and identity management are perfect partners.

Security versus usability a conundrum in modern identity management?
Convenience and usability vs. security when dealing with a valuable verified identity.

The costs, the privacy and the security of IAM and personal data sharing
Resolving the issues of data storage and security when implementing life management platforms.

Feeling secure enough to use open source for IAM projects
Using open source software to add functionality to your IAM systems within a secure framework.