<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://identity-resources.com/resources/amazon-selfie-password-is-this-the-feature/</loc>
<lastmod>2017-01-28T10:57:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/universal-second-factor-and-openid-connect/</loc>
<lastmod>2017-01-30T10:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/authentication-is-multi-headed-beast-for-purging-passwords/</loc>
<lastmod>2017-02-27T03:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/eba-seeks-input-on-strong-customer-authentication-and-secure-communication-under-psd2/</loc>
<lastmod>2017-02-27T05:39:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/symbol-to-accept-the-newest-innovation-in-mobile-based-authentication/</loc>
<lastmod>2017-02-27T05:48:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/common-questions-about-two-factor-authentication/</loc>
<lastmod>2017-02-27T05:50:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-move-to-multi-factor-authentication-are-passwords-past-their-prime/</loc>
<lastmod>2017-02-27T05:52:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/white-paper-multi-factor-authentication-best-practices-for-securing-the-modern-digital-enterprise/</loc>
<lastmod>2017-02-27T05:54:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/google-is-trying-to-stop-you-having-to-put-in-passwords/</loc>
<lastmod>2017-02-27T05:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/google-aims-to-kill-passwords-by-the-end-of-this-year/</loc>
<lastmod>2017-02-27T05:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/googles-open-yolo-project-will-remove-the-need-for-passwords-on-android/</loc>
<lastmod>2017-02-27T06:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/whats-the-true-cost-of-authentication/</loc>
<lastmod>2017-02-27T06:02:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fido-authentication-why-you-should-care/</loc>
<lastmod>2017-02-27T06:05:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/will-apple-support-nfc-tags-in-ios-10-for-the-iphone-7/</loc>
<lastmod>2017-02-27T06:12:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/does-the-apple-iphone-7-support-nfc-tags/</loc>
<lastmod>2017-02-27T06:18:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/walmart-turns-digital-receipts-into-shopping-opportunities/</loc>
<lastmod>2017-02-27T06:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-do-nfc-tags-prevent-copying/</loc>
<lastmod>2017-02-27T06:25:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/tap-and-pay-weaknesses-of-nfc/</loc>
<lastmod>2017-02-27T06:31:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/banking-biometrics-hacking-into-your-account-is-easier-than-you-think/</loc>
<lastmod>2017-02-27T06:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-question-when-will-biometrics-take-over-from-passwords/</loc>
<lastmod>2017-02-27T06:45:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/use-of-online-activity-as-part-of-the-identity-verification/</loc>
<lastmod>2017-02-27T06:48:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/behavioural-biometrics-the-future-of-security/</loc>
<lastmod>2017-02-27T06:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/multifactor-authentication-sees-40-percent-growth-in-2016/</loc>
<lastmod>2017-02-27T06:59:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-behavioral-biometrics-can-enhance-security/</loc>
<lastmod>2017-02-27T07:05:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/adding-behavioral-biometrics-to-adaptive-authentication/</loc>
<lastmod>2017-02-27T07:06:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/ibm-dives-into-behavioral-biometrics/</loc>
<lastmod>2017-02-27T07:07:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-behavioral-biometrics-is-innovating-it-security/</loc>
<lastmod>2017-02-27T07:08:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fighting-fraud-with-behavioral-biometrics-and-cognitive-fraud-detection/</loc>
<lastmod>2017-02-27T07:09:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/ecg-biometric-technology-and-other-security-insights/</loc>
<lastmod>2017-02-27T07:12:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/voice-dna-fingerprint-and-others-how-5-biometric-security-solutions-compare/</loc>
<lastmod>2017-02-27T07:15:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/nec-trials-cashless-payment-services-using-face-recognition/</loc>
<lastmod>2017-02-27T07:30:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fujitsu-launches-online-biometric-authentication-service/</loc>
<lastmod>2017-02-27T07:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/is-mastercards-selfie-pay-too-much-of-a-security-risk/</loc>
<lastmod>2017-02-27T07:42:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/want-to-beat-facial-recognition-get-some-funky-tortoiseshell-glasses/</loc>
<lastmod>2017-02-27T07:43:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/do-you-own-your-own-fingerprints/</loc>
<lastmod>2017-02-27T07:44:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fingerprint-recognition-dominates-biometrics-market-for-now/</loc>
<lastmod>2017-02-27T07:47:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-are-smartphone-fingerprint-biometrics-evolving/</loc>
<lastmod>2017-02-27T07:48:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/gesture-recognition-and-touchless-sensing-market-worth-23-dot-55-billion-usd-by-2020/</loc>
<lastmod>2017-02-27T07:49:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/visa-replacing-password-with-biometrics/</loc>
<lastmod>2017-02-27T07:52:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/qatar-national-bank-deploys-iris-scanning-atms/</loc>
<lastmod>2017-02-27T07:53:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/barclays-to-introduce-finger-vein-id-readers/</loc>
<lastmod>2017-02-27T07:54:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/hey-siri-how-does-voice-recognition-software-understand-me/</loc>
<lastmod>2017-02-27T07:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-isnt-voice-recognition-software-more-accurate/</loc>
<lastmod>2017-02-27T07:57:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/discover-the-advancements-and-risks-of-mobile-biometrics/</loc>
<lastmod>2017-02-27T07:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/first-direct-customers-locked-out-of-their-bank-accounts-after-voice-id-system-fails-to-recognise-them/</loc>
<lastmod>2017-02-27T07:59:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/biometric-authentication-finding-a-balance-between-ux-and-it-security/</loc>
<lastmod>2017-02-27T08:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/your-face-is-not-your-password-face-authentication-by-passing-lenovo-asus-toshiba/</loc>
<lastmod>2017-02-27T08:02:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/selfies-to-kill-off-passwords-within-5-years-says-mastercard/</loc>
<lastmod>2017-02-27T08:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/what-is-blockchain-technology/</loc>
<lastmod>2017-02-28T01:47:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/blockchain-how-to-improve-online-identity-management/</loc>
<lastmod>2017-02-28T05:03:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/blockchain-and-identity-verification-anonymity-versus-trusted-participant/</loc>
<lastmod>2017-02-28T05:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/ping-distributed-ledgers-are-the-future-of-identity-security/</loc>
<lastmod>2017-02-28T05:06:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/applying-blockchain-to-identity/</loc>
<lastmod>2017-02-28T05:09:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/what-is-the-impact-of-blockchains-on-privacy/</loc>
<lastmod>2017-02-28T05:10:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/european-commissions-new-boost-for-bitcoin-and-blockchain-startups/</loc>
<lastmod>2017-02-28T05:11:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/blythe-masters-tells-banks-the-blockchain-changes-everything/</loc>
<lastmod>2017-02-28T05:13:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-impact-of-the-blockchain-goes-beyond-financial-services/</loc>
<lastmod>2017-02-28T05:14:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/state-of-blockchain-q1-2016-blockchain-funding-overtakes-bitcoin/</loc>
<lastmod>2017-02-28T05:15:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/2017-blockchain-predictions/</loc>
<lastmod>2017-02-28T05:16:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/are-bank-blockchain-partnerships-putting-the-cart-before-the-horse/</loc>
<lastmod>2017-02-28T05:17:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/what-mark-zuckerbergs-password-hack-says-about-cybersecurity/</loc>
<lastmod>2017-02-28T05:18:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fbi-signs-twitter-surveillance-contract/</loc>
<lastmod>2017-02-28T05:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/ten-risks-of-pki-what-youre-not-being-told-about-public-key-infrastructure/</loc>
<lastmod>2017-02-28T05:21:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/your-battery-status-is-being-used-to-track-you-online/</loc>
<lastmod>2017-02-28T05:23:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-linkedins-password-sloppiness-hurts-us-all/</loc>
<lastmod>2017-02-28T05:25:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-start-ups-must-step-up-on-data-security/</loc>
<lastmod>2017-02-28T05:26:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-check-if-your-vpn-is-leaking-private-data/</loc>
<lastmod>2017-02-28T05:27:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/ten-steps-to-beating-id-fraud-how-you-can-avoid-falling-victim-to-the-conmen/</loc>
<lastmod>2017-02-28T05:27:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/politicians-fingerprint-cloned-from-photos-by-hacker-bbc/</loc>
<lastmod>2017-02-28T05:28:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/security-for-journalists-part-one-the-basics/</loc>
<lastmod>2017-02-28T05:30:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/security-for-journalists-part-two-threat-modeling/</loc>
<lastmod>2017-02-28T05:30:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/eight-things-you-need-to-do-right-now-to-protect-yourself-online/</loc>
<lastmod>2017-02-28T05:32:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-comply-with-data-protection-legislation/</loc>
<lastmod>2017-02-28T05:33:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-hr-needs-to-know-about-new-eu-rules-on-data-protection/</loc>
<lastmod>2017-02-28T05:34:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/data-breach-fines-to-jump-following-eu-gdpr-adoption/</loc>
<lastmod>2017-02-28T05:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/data-protection-firmly-on-the-agenda-next-year/</loc>
<lastmod>2017-02-28T05:37:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/top-3-data-types-that-criminals-will-attempt-to-obtain-whenever-they-can/</loc>
<lastmod>2017-02-28T05:37:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/personal-data-being-shared-on-huge-scale-claims-which/</loc>
<lastmod>2017-02-28T05:38:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-disappear-online-a-guide-to-removing-your-digital-footprint/</loc>
<lastmod>2017-02-28T05:40:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/online-security-101-tips-for-protecting-your-privacy-from-hackers-and-spies/</loc>
<lastmod>2017-02-28T05:45:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-five-minute-cio-helen-dixon-data-protection-commissioner/</loc>
<lastmod>2017-02-28T05:46:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/youve-lost-your-iphone-now-what/</loc>
<lastmod>2017-02-28T05:46:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/delete-after-death-what-to-do-with-digital-identity-when-a-loved-one-dies/</loc>
<lastmod>2017-02-28T05:47:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/digital-legacy-the-fate-of-your-online-soul/</loc>
<lastmod>2017-02-28T05:49:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/beyond-the-grave-have-you-planned-your-digital-legacy/</loc>
<lastmod>2017-02-28T05:50:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-do-we-protect-our-digital-legacy-after-death/</loc>
<lastmod>2017-02-28T05:51:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/life-after-death-how-will-you-handle-your-digital-legacy/</loc>
<lastmod>2017-02-28T05:52:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/social-media-will-template/</loc>
<lastmod>2017-02-28T05:53:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/managing-your-digital-legacy-will-others-be-able-to-access-your-cloud-based-files-when-you-no-longer-can/</loc>
<lastmod>2017-02-28T05:54:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/cryptotestament-encrypted-device-to-secure-digital-legacies/</loc>
<lastmod>2017-02-28T05:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/death-and-your-digital-footprint-creating-a-personal-assets-log/</loc>
<lastmod>2017-02-28T06:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/a-clever-use-of-qr-codes-to-help-students-log-in/</loc>
<lastmod>2017-02-28T06:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-think-about-student-data-privacy/</loc>
<lastmod>2017-02-28T06:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/a-start-up-moves-teachers-past-data-entry/</loc>
<lastmod>2017-02-28T06:05:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/passwords-get-the-boot-as-students-use-their-own-qr-codes/</loc>
<lastmod>2017-02-28T06:06:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/clevers-new-badges-help-k-2-students-access-apps-on-its-education-platform/</loc>
<lastmod>2017-02-28T06:07:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/think-its-hard-to-remember-your-passwords/</loc>
<lastmod>2017-02-28T06:08:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/overview-of-the-gdpr/</loc>
<lastmod>2017-02-28T06:09:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/general-data-protection-regulation-10-things-you-need-to-know/</loc>
<lastmod>2017-03-01T03:09:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/british-companies-will-face-fines-of-up-to-ps17m-for-data-breaches-as-government-adopts-strict-eu-law/</loc>
<lastmod>2017-03-01T03:10:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/what-will-the-general-data-protection-regulation-mean-for-business/</loc>
<lastmod>2017-03-01T03:11:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/gdpr-more-concern-for-marketing-or-it/</loc>
<lastmod>2017-03-01T03:12:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/what-small-businesses-must-know-about-gdpr-and-mifid-ii/</loc>
<lastmod>2017-03-01T03:15:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/complying-with-the-general-data-protection-regulation-gdpr-in-europe/</loc>
<lastmod>2017-03-01T03:17:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/great-examples-of-transparent-data-and-privacy-policies-ahead-of-gdpr-enforcement/</loc>
<lastmod>2017-03-01T03:18:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/understanding-gdpr-and-customer-identity-management/</loc>
<lastmod>2017-03-01T03:39:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/new-eu-rules-could-cost-uk-firms-ps122bn-in-cybersecurity-fines-pci-ssc/</loc>
<lastmod>2017-03-01T03:40:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/brexit-ico-says-gdpr-will-come-into-effect-before-britain-leaves-the-eu/</loc>
<lastmod>2017-03-01T03:41:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/eu-regulations-on-algorithmic-decision-making-and-a-right-to-explanation/</loc>
<lastmod>2017-03-01T03:42:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/a-lack-of-guidance-over-the-eus-gdpr-could-cripple-british-businesses/</loc>
<lastmod>2017-03-01T03:45:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-credential-and-access-management-in-the-cloud/</loc>
<lastmod>2017-03-01T06:19:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-best-identity-management-services-of-2016/</loc>
<lastmod>2017-03-01T06:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/protecting-identity-could-be-key-to-enterprise-security/</loc>
<lastmod>2017-03-01T06:22:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-is-broken-is-there-money-to-be-made-in-fixing-it/</loc>
<lastmod>2017-03-01T06:23:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-business-of-our-digital-identity/</loc>
<lastmod>2017-03-01T06:25:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/bring-your-own-identity-gains-steam-in-information-security/</loc>
<lastmod>2017-03-01T06:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-moments-ahead-for-identity/</loc>
<lastmod>2017-03-01T06:36:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/edward-snowden-says-the-central-problem-of-the-future-is-control-of-user-data/</loc>
<lastmod>2017-03-01T06:57:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/a-framework-for-identity/</loc>
<lastmod>2017-03-01T06:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-as-a-service-idaas-is-more-important-than-ever/</loc>
<lastmod>2017-03-01T07:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/understanding-idaas-the-benefits-and-risks-of-identity-as-a-service/</loc>
<lastmod>2017-03-01T07:06:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-as-a-service-idaas/</loc>
<lastmod>2017-03-01T07:07:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/comparing-identity-as-a-service-idaas-providers/</loc>
<lastmod>2017-03-01T07:08:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-management-in-an-era-of-digital-disruption-computerworld/</loc>
<lastmod>2017-03-01T07:12:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-in-the-21st-century/</loc>
<lastmod>2017-03-01T07:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/25-plus-ways-to-manage-your-online-identity/</loc>
<lastmod>2017-03-01T07:23:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-role-of-identity-on-the-internet-is-key/</loc>
<lastmod>2017-03-01T07:26:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-think-about-privacy-and-managing-your-online-identity/</loc>
<lastmod>2017-03-01T07:28:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-fraud-how-to-protect-yourself/</loc>
<lastmod>2017-03-01T07:29:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/whom-do-you-trust-to-manage-your-identity-assets/</loc>
<lastmod>2017-03-01T07:30:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/openid-connect-may-usher-in-a-new-era-of-federated-online-identity/</loc>
<lastmod>2017-03-01T07:53:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/reso-and-openid-connect-the-future-of-your-identity/</loc>
<lastmod>2017-03-01T07:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/openid-connect-poised-for-greatness-in-enterprise-authentication/</loc>
<lastmod>2017-03-01T08:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/standards-group-working-on-id-federation-recipes-to-ease-implementation/</loc>
<lastmod>2017-03-01T08:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/netscape-co-founder-passwords-are-the-weak-link-in-cyber-security/</loc>
<lastmod>2017-03-01T08:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/password-management-amateurs-hack-systems-professionals-hack-people/</loc>
<lastmod>2017-03-01T08:10:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-can-a-small-business-password-protect-itself/</loc>
<lastmod>2017-03-01T08:12:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/5-password-management-apps-that-will-work-on-all-your-devices/</loc>
<lastmod>2017-03-01T08:31:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/highly-encrypted-password-management-software-to-secure-your-passwords/</loc>
<lastmod>2017-03-01T08:33:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/you-need-a-password-manager-here-are-some-good-free-ones/</loc>
<lastmod>2017-03-01T08:53:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/would-your-password-withstand-1oo-guesses-from-a-hacker/</loc>
<lastmod>2017-03-01T08:54:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/guest-comment-digital-identity-is-broken-can-we-fix-it/</loc>
<lastmod>2017-03-01T09:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/top-5-best-password-managers/</loc>
<lastmod>2017-03-01T09:07:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-privacy-revolt-the-growing-demand-for-privacy-as-a-service/</loc>
<lastmod>2017-03-02T06:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/is-facial-recognition-teach-really-a-threat-to-privacy/</loc>
<lastmod>2017-03-02T08:29:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/how-to-permanently-delete-your-facebook-account/</loc>
<lastmod>2017-03-02T08:31:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/facebook-tramples-on-european-law-says-privacy-policy/</loc>
<lastmod>2017-03-02T08:37:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/nsa-surveillance-how-librarians-have-been-on-the-front-line-to-protect-privacy/</loc>
<lastmod>2017-03-02T08:38:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/uk-surveillance-law-marks-a-worse-than-scary-shift/</loc>
<lastmod>2017-03-02T08:40:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/eu-data-privacy-officer-rule-triggers-search-for-talent/</loc>
<lastmod>2017-03-02T08:42:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/facebook-isnt-looking-out-for-your-privacy-it-wants-your-data-for-itself/</loc>
<lastmod>2017-03-02T08:43:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-path-to-self-sovereign-identity/</loc>
<lastmod>2017-03-02T08:44:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/young-adults-take-more-security-measures-for-their-online-privacy-than-their-elders/</loc>
<lastmod>2017-03-02T08:45:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/the-facebook-algorithm-is-watching-you-heres-one-way-to-confuse-it/</loc>
<lastmod>2017-03-02T08:47:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/explaining-psd2-without-tlas-is-tough/</loc>
<lastmod>2017-03-02T08:49:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/guidance-issued-on-calculating-professional-indemnity-insurance-obligations-under-psd2/</loc>
<lastmod>2017-03-02T08:50:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/psd2-seizing-the-opportunity/</loc>
<lastmod>2017-03-02T08:54:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/christopher-kong-psd2-means-opportunity/</loc>
<lastmod>2017-03-02T08:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/psd2-this-changes-everything/</loc>
<lastmod>2017-03-02T08:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/psd2-explained-in-2-minutes/</loc>
<lastmod>2017-03-02T08:57:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-are-skype-accounts-getting-hacked-so-easily/</loc>
<lastmod>2017-03-02T08:59:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/fbi-seeks-hacker-after-1-dot-2-billion-logins-are-stolen/</loc>
<lastmod>2017-03-02T09:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/nhs-approved-apps-found-leaking-id-data/</loc>
<lastmod>2017-03-02T09:02:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/carphone-warehouse-in-customer-data-breach/</loc>
<lastmod>2017-03-02T09:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/password-manager-lastpass-hacked-exposing-encrypted-master-passwords/</loc>
<lastmod>2017-03-02T09:05:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/yahoo-hack-1bn-accounts-compromised-by-biggest-data-breach-in-history/</loc>
<lastmod>2017-03-02T09:06:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/more-than-200-mobile-websites-and-apps-leaked-personally-identifiable-information/</loc>
<lastmod>2017-03-02T09:07:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/suddenly-hot-smart-home-devices-are-ripe-for-hacking-experts-warn/</loc>
<lastmod>2017-03-02T09:08:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/social-sign-on-should-i-try-it-on-my-website/</loc>
<lastmod>2017-03-02T09:11:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/9-things-you-should-know-about-social-login-and-cro/</loc>
<lastmod>2017-03-02T09:13:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-is-facebook-dominating-social-sign-in/</loc>
<lastmod>2017-03-02T09:17:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/social-login-buttons-arent-worth-it-2012/</loc>
<lastmod>2017-03-02T09:19:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/social-sign-on-the-implications-for-ecommerce-sites/</loc>
<lastmod>2017-03-02T09:22:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/maximizing-conversion-rates-using-social-sign-in/</loc>
<lastmod>2017-03-02T09:23:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/why-you-should-think-twice-before-using-that-social-sign-in/</loc>
<lastmod>2017-03-02T09:24:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/like-it-or-not-authentication-via-social-sign-in-is-here-for-the-holidays/</loc>
<lastmod>2017-03-02T09:25:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/eurocomply/</loc>
<lastmod>2017-03-03T03:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/sensipass/</loc>
<lastmod>2017-03-03T03:36:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/signal/</loc>
<lastmod>2017-03-03T03:37:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/cryptotestament/</loc>
<lastmod>2017-03-03T03:39:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/cloud-identity-summit-2017/</loc>
<lastmod>2017-03-03T03:40:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/garner-security-and-risk-management-summit/</loc>
<lastmod>2017-03-03T03:43:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/infosecurity-europe/</loc>
<lastmod>2017-03-03T03:44:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/infosec-world-conference-and-expo/</loc>
<lastmod>2017-03-03T03:46:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/isseconf/</loc>
<lastmod>2017-03-03T03:47:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/rsa-conference-usa/</loc>
<lastmod>2017-03-03T03:59:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/sc-congress/</loc>
<lastmod>2017-03-03T04:04:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/tech-savvy-targeted-by-id-thieves-says-experian/</loc>
<lastmod>2017-03-09T08:10:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-fraud/</loc>
<lastmod>2017-03-09T08:18:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-thieves-target-tenants/</loc>
<lastmod>2017-03-09T08:19:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/men-46-most-likely-fraud-victims-says-cifas/</loc>
<lastmod>2017-03-09T08:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/millions-of-customers-vulnerable-to-fraud-warns-banks/</loc>
<lastmod>2017-03-09T08:20:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/identity-fraud-up-by-57-percent-as-thieves-hunt-on-social-media/</loc>
<lastmod>2017-03-09T08:21:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/sharp-rise-in-identity-fraud-as-scammers-use-facebook-and-other-social-media-sites-to-hunt-for-information/</loc>
<lastmod>2017-03-09T08:22:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/resources/infographic-are-you-losing-your-identity/</loc>
<lastmod>2017-03-09T08:23:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/authentication/</loc>
<lastmod>2017-01-28T10:51:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/biometrics/</loc>
<lastmod>2017-01-28T10:51:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/cyber-security/</loc>
<lastmod>2017-01-28T10:52:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/authentication-devices/</loc>
<lastmod>2017-02-03T15:50:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/behavioral-biometrics/</loc>
<lastmod>2017-02-03T15:51:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/blockchain/</loc>
<lastmod>2017-02-03T15:52:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/data-protection/</loc>
<lastmod>2017-02-03T15:53:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/digital-legacy/</loc>
<lastmod>2017-02-03T15:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/education/</loc>
<lastmod>2017-02-03T15:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/gdpr/</loc>
<lastmod>2017-02-03T15:55:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/identity-and-access-management/</loc>
<lastmod>2017-02-03T15:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/identity-as-a-service/</loc>
<lastmod>2017-02-03T15:56:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/identity-fraud/</loc>
<lastmod>2017-02-03T15:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/identity-management/</loc>
<lastmod>2017-02-03T15:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/open-id/</loc>
<lastmod>2017-02-03T15:58:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/passwords/</loc>
<lastmod>2017-02-03T15:59:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/privacy/</loc>
<lastmod>2017-02-03T16:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/psd2/</loc>
<lastmod>2017-02-03T16:00:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/security-breaches/</loc>
<lastmod>2017-02-03T16:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/social-sign-on/</loc>
<lastmod>2017-02-03T16:01:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/events/</loc>
<lastmod>2017-02-03T16:02:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/topics/startups/</loc>
<lastmod>2017-03-03T03:35:00+00:00</lastmod>
</url>
<url>
<loc>http://identity-resources.com/404/</loc>
</url>
<url>
<loc>http://identity-resources.com/about/</loc>
</url>
<url>
<loc>http://identity-resources.com/contact/</loc>
</url>
<url>
<loc>http://identity-resources.com/</loc>
</url>
</urlset>
