Key Recommendations
The best identity management services of 2016
All Articles
Bring your own identity gains steam in information security
Bring-your-own-identity (BYOI, or sometimes BYOID) is an emerging concept in Identity and Access Management. BYOI has become interesting because it presents a realistic solution to a pressing problem: the need for better federated identity management.
Protecting identity could be key to enterprise security
When you hear from people who know about security, the discussion often turns to end users, who are considered the weakest link in the security chain. While IT and the powers that be struggle to secure their networks and IP, the employees are forever screwing up succumbing to phishing scams, using weak credentials and generally causing problems for the security experts who know best — or so says conventional wisdom.
Identity is broken, is there money to be made in fixing it?
We all know that passwords are beyond their sell-by date – the IT industry has been telling us for years; and it seems that recently every week there has been a press release telling us about yet another new method of authenticating yourself to this banking service, or your mobile phone.
The business of our digital identity
The idea that we all have a digital identity that is unique and personal is still a relatively new idea. A digital identify is not a “brand new” identity that has been created as we trawl through the web looking at pictures of cats or messaging each other through Facebook.
The moments ahead for identity
My address to the European Identity Conference 2016. Although this starts like my TCP/IP Moment talk it goes in a very different direction. In some regards, I think this might be the most important talk I have ever written and delivered
Edward Snowden says “the central problem of the future” is control of user data
A framework for identity
Last summer, IDEO coLAB brought together 25 students from top Boston-area universities — including Harvard, MIT, Tufts, and RISD — to design venture prototypes exploring the future of trust, transactions, and reputation. Before the program, I hadn’t given much thought to the concept of “identity” or identity systems. But abstract concepts start to take shape and become more tangible when you run into them repeatedly.
Know of a resource that helps people secure their data? Submit it today