Will WebAuthn replace passwords or not?

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

05/15/18

Can we use a social media model to improve privacy attitudes?

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

04/10/18

How the Facebook privacy debacle is connected to the movement of IAM to containers

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

03/27/18

The cloud’s the limit for secure, compliant identity storage and personal data

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

03/07/18

What happens if... disaster recovery for the smart city and beyond

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

02/20/18

Data as a smart superstructure: a warning to the wise

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

02/14/18

Identity and the smart city

Identity and the smart city

IAMs next big outing.

02/06/18

Is privacy the new security?

Is privacy the new security?

Privacy will become the next big issue for identity data architects and individuals alike.

01/23/18

Privacy and metrics of testing and staging environments

Privacy and metrics of testing and staging environments

Why data privacy should be respected throughout testing as well as production.

01/10/18

May the forces be with you: using IPaaS for IAM and GDPR

May the forces be with you: using IPaaS for IAM and GDPR

Getting your head around GDPR with some new tools of the trade.

12/19/17

Microservices for IAM: container security and personal data

Microservices for IAM: container security and personal data

Using containers and microservices to provide better IAM.

12/05/17

Credential recovery: disaster recovery for the consumer

Credential recovery: disaster recovery for the consumer

The question is, help desk vs. self-service?

11/21/17

Image management in identity management: a picture paints a thousand words

Image management in identity management: a picture paints a thousand words

Image management can give us the tools to secure and optimize image-based PII.

10/31/17

Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen?

Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen?

The story of a blockchain that may not break, but will bend.

10/24/17

When big data gets personal...and cloudy

When big data gets personal...and cloudy

What are the considerations for security and scalability when choosing cloud storage for identity platforms that service multiple millions, even billions of users?

10/16/17

Authenticating your customers: the tripartite of consumer authentication

Authenticating your customers: the tripartite of consumer authentication

Things to consider when choosing which authentication options to offer in identity systems for wide demographics. How the mix of security, usability, and customer attitude affects that choice.

10/02/17

Identity data in the world of GDPR

Identity data in the world of GDPR

The GDPR says that “The processing of personal data should be designed to serve mankind.“ How CIAM identity systems can help serve some of the privacy requirements of GDPR.

09/25/17

Another day, another case of Grand Theft Data. Can a verified ID save the day?

Another day, another case of Grand Theft Data. Can a verified ID save the day?

How verified consumer identity can prevent mass-hacks like Equifax and others. Verified identity can be used alongside other technologies – such as blockchain, and anonymization – to prevent the exposure of data across multiple online...

09/13/17

Hacking the GDPR

Hacking the GDPR

Using anonymization and pseudonymization to reduce the overhead of GDPR compliance.

08/14/17

The road to APIness in customer identity

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

07/31/17

Load More