Category: compliance

Consumer Centric Identity

What is identity orchestration and decisioning?

The notion of the identity ecosystem is not new. However, the alignment of data, APIs, and modern protocols has created a perfect environment for that identity ecosystem to thrive Users of online services demand a simple, secure, and low-friction experience. They don’t want to go through a complicated onboarding process with the result that they…
Read more

How an Open Loop Identity Network Can Harden VRPs Against Fraud

When a new technology or process appears, you need something distinct, uncomplicated, and beneficial to prove the point. Open banking is an example of a disruptive force that looks set to shake up incumbent systems such as direct debits; Juniper Research expects open banking to handle more than $116 billion in global payment transactions by 2026. Variable Recurring Payments…
Read more

Open Banking – The answer to reducing fraud and streamlining access to government services

Government services have been on a roller coaster ride for years now as technologies come and go. This situation is not unique to the UK. Government bodies across the world are actively trying to tackle the issues of customer engagement using identity tools. In the UK, even with the efforts of Verify, we still have…
Read more

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience. When you think of Payment Services Directive 2 (PSD2), what likely springs to mind is the implementation of the Secure Customer Authentication rule (SCA). SCA was brought in as an additional…
Read more

What Happens If… Disaster Recovery for the Smart City and Beyond

Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too…
Read more

Is Privacy The New Security?

Security is a very wide subject. If we pare it down to cybersecurity, it still covers everything from the wanton damage of IT systems to espionage to data breaches. Security touches all points in a system, from the human operator out to the Cloud and beyond. Cybersecurity is a fundamental aspect of an identity system.…
Read more

May The Forces be With You: Using IPaaS for IAM and GDPR

The General Data Protection Directive GDPR which comes into force on May 25, 2018, may well be the most written about directive ever. There is a reason for this. It is complicated, involves data, and it cuts across country boundaries like Attila the Hun could never achieve. I recently did a webinar on GDPR, hoping…
Read more

Hacking The GDPR

Just uttering the words General Data Protection Regulation (GDPR) is almost enough to make grown adults faint. The GDPR is the updated and more stringent version of the European Union Data Protection Directive 95/46 EC which goes back to 1995. Things have changed a lot since the nineties. For one thing, the Internet in 1995…
Read more