Category: Data Management

Consumer Centric Identity

Deepfake fraud: protecting businesses with orchestrated identity verification

Discover how deepfake technology is revolutionizing synthetic identity fraud, costing businesses billions. Learn how to protect your business from deepfake fraud. #DeepfakeFraud #IdentityVerification #AIFraud

What is identity orchestration and decisioning?

The notion of the identity ecosystem is not new. However, the alignment of data, APIs, and modern protocols has created a perfect environment for that identity ecosystem to thrive Users of online services demand a simple, secure, and low-friction experience. They don’t want to go through a complicated onboarding process with the result that they…
Read more

Feeling secure enough to use open source for IAM projects

Identity is big, really big, especially when it is customer facing. There are a lot of moving parts to build, pieces to hook up, and external functionality to integrate. The whole makes the identity ecosystem which was once a dream of a few but is fast becoming a reality for many. Part of this movement…
Read more

Oh No, Not Another Article About Passwords: Will WebAuthn Replace Passwords or Not?

The humble, much-maligned password has been in the news again lately. The FIDO Alliance and W3C announced in April the release of the password killer web API named WebAuthn. But, are we singing the “Bye, bye password” song, only to start up a chorus of “You say goodbye and I say hello”? Let’s take a…
Read more

The Cloud’s the Limit for Secure, Complaint, Identity Storage, and Personal Data

Back in 2009, I gave a talk about Cloud identity. It went down, less like a fluffy Cloud and more like a lead balloon. It was too early – way too early. But as we reach peak Cloud adoption, with rates of uptake reaching 93%, the sky’s the limit for digital identity. Cloud computing has…
Read more

What Happens If… Disaster Recovery for the Smart City and Beyond

Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too…
Read more

Data as a Smart Superstructure: A Warning to the Wise

In a previous article, I talked about how we need to build a smart identity for a smart city. The article, hopefully, pointed to building a perspective on what smart actually means. But, smart cities are built up from many smart pieces. These ‘smart pieces’ are really just an evolution of our current critical infrastructures…
Read more

Identity and The Smart City

Human beings love cities, well many of us do. We love them so much that the United Nations are predicting that by 2050, 66% of us will live in them. So how do to make sure that all of those people are housed, have clean water, can get into and out of the city easily,…
Read more

Is Privacy The New Security?

Security is a very wide subject. If we pare it down to cybersecurity, it still covers everything from the wanton damage of IT systems to espionage to data breaches. Security touches all points in a system, from the human operator out to the Cloud and beyond. Cybersecurity is a fundamental aspect of an identity system.…
Read more

May The Forces be With You: Using IPaaS for IAM and GDPR

The General Data Protection Directive GDPR which comes into force on May 25, 2018, may well be the most written about directive ever. There is a reason for this. It is complicated, involves data, and it cuts across country boundaries like Attila the Hun could never achieve. I recently did a webinar on GDPR, hoping…
Read more