The OpenID Foundation Board has approved the development of a new service to enable stronger partnership with “managing entities” and “accredited laboratories” that wish to deploy the OpenID Foundation tests and best practices within a wider ecosystem conformance service. This additional service is scheduled for launch in Q2 2026, and will operate alongside the existing […] The post OIDF Announces New Investment to Expand Conformance Services first appeared on OpenID Foundation.| OpenID Foundation
Today, the Aspen Institute Financial Security Program launched a groundbreaking National Strategy on Fraud and Scam Prevention. The OpenID Foundation was delighted to participate as a task force member, contributing to the effort alongside more than 80 cross-sector partners. This represents the first time such a broad collection of leaders from government, law enforcement, private […] The post OIDF Supports National Strategy on Fraud and Scam Prevention first appeared on OpenID Foundation.| OpenID Foundation
COLUMBIA, Md.–(BUSINESS WIRE)–BigBear.ai (NYSE: BBAI) today announced that Troy™, the company’s intelligent workflow engine designed to automate and accelerate the process of binary reverse engineering, has achieved “Awardable” status and is now available for procurement on the Chief Digital and Artificial Intelligence Office’s (CDAO) Tradewinds Solutions Marketplace. Troy™ is the latest of six BigBear.ai products now available on […]| Merchant Fraud Journal
[vc_row][vc_column][vc_column_text]Identity verification, the process by which financial institutions confirm your identity, has evolved over the years due to technological advancements, as well as our dependency on and the convenience of digital devices. Traditionally, this verification process depended on in-person interactions with bank staff and the presentation of physical documents, such as passports, driver's licenses and utility bills. However, these documents can be susceptible to fo...| FedPayments Improvement
Whether applying for a credit card or starting a new job, digital verification services (DVS) are already saving people and businesses time and money. But to make sure the benefits of DVS are realised in sectors right across the economy, …| Enabling digital identity
Digital verification services sometimes want to use “data brokers” for this purpose and we’ve been asked how they should be treated.| enablingdigitalidentity.blog.gov.uk
Supporting Australia’s Digital Trust Ecosystem The OpenID Foundation’s Australian Digital Trust Community Group (ADT CG) has submitted comments to Australia’s Productivity Commission on its Interim Report covering data and digital technology policy, demonstrating the Foundation’s commitment to supporting policy development in Australia through expert technical guidance and industry collaboration. The ADT CG serves as a […] The post Australian Digital Trust Community Group responds t...| OpenID Foundation
Learn how SSF/CAEP enables real-time security responses while STIX/TAXII powers threat intelligence. Expert analysis by Okta's Apoorva Deshpande| OpenID Foundation - Helping people assert their identity wherever they choose
Authentication migrations fail 40% of the time, costing millions in downtime. Learn the strategies security leaders use to avoid disaster, choose the right vendors, and build future-proof identity infrastructure that won't lock you in.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
You can avoid your service falling off the GOV.UK register by asking your conformity assessment body to complete your recertification process up to 60 days early. You won't lose the remaining time on your current certificate if you do this, and it will help you to avoid any unnecessary disruption.| Enabling digital identity
Getting onto the GOV.UK register of digital identity and attribute services is not an automatic process. It can take up to 20 working days for your service to appear on the register.| enablingdigitalidentity.blog.gov.uk
If one principal can do anything, one mistake can undo everything. I’ve read too many incident reviews where the “automation user” turned out to be the attacker’s best friend. One token. All the doors. Code, artifacts, production. We built CI/CD to go fast. We accidentally made it the fastest path to a breach. Just like...| Identity Defined Security Alliance
Most companies are creating massive security blind spots by forcing AI agents into human identity systems. Shared accounts and static permissions put your digital workforce at risk.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Every day, people use official government documents like passports or driving licences to prove things about themselves in the economy. However, these physical documents weren’t designed for the digital age. This is why, through the Data (Use and Access) Act, …| enablingdigitalidentity.blog.gov.uk
This blog was originally published by Bravura Security here. A stark reality faces modern enterprises: 94% of cyber attacks now specifically target identity systems, not traditional network defenses. As threats rapidly evolve, organizations struggling with fragmented identity and access management (IAM), privileged and access management (PAM), and password management architectures face increasing risk from sophisticated...| Identity Defined Security Alliance
Your firewall can't protect data from rogue admins or compromised systems. TEEs create hardware-secured "safe rooms" inside processors - protecting your most sensitive information even when everything else fails. Here's why every business needs to understand this game-changing technology.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
State officials from 6 leading US states discuss mobile driver's license adoption, use cases, and resident satisfaction at the Federal mDL Industry Day.| OpenID Foundation - Helping people assert their identity wherever they choose
Today we’ve published a call for views on the adoption of trust services. You can respond to the call for views on GOV.UK until the 20th of September 2025. What are trust services? Trust services are digital tools, such as …| Enabling digital identity
We’ve been asked variously for some kind of document with a gap analysis or assimilation matrix. We don't have one. This is why.| Enabling digital identity
Trusted and secure digital identity services have a vital role in enabling productivity and growth within the financial services sector, offering process efficiencies and helping to combat identity fraud. Over the past few years, we’ve heard from sector firms about …| enablingdigitalidentity.blog.gov.uk
This deal represents the maturation of the identity market. The days of pure-play identity vendors competing primarily on features are ending. The future belongs to integrated security platforms with identity as a core pillar.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
OIDF leads discussion at IGF 2025 on balancing digital identity interoperability with sovereignty for developing countries, with ey insights on inclusion.| OpenID Foundation - Helping people assert their identity wherever they choose
You want to tell people that your service is certified and on the GOV.UK register of digital identity and attribute services. What should you say and what shouldn't you?| Enabling digital identity
Today, we’ve published the findings from the second annual digital identity inclusion monitoring report. The report helps to monitor inclusion and accessibility in the certified digital identity market over time. You can read the full report on GOV.UK. The government …| enablingdigitalidentity.blog.gov.uk
On 19 June, the Data (Use and Access) Act received Royal Assent. This is a major milestone for the government’s work to make sure individuals and businesses across the UK have access to trusted digital identity services when they want to use them| enablingdigitalidentity.blog.gov.uk
Open standards are the backbone of interoperable digital identity. Here's what that really means and why the details matter more than ever.| Spherical Cow Consulting
The paper falls far short in its appreciation for human-centred design, and this is quite typical of contemporary approaches to digital identity.| Generative Identity
Learn why businesses should adopt digital credentials and how they combat fraud while navigating complex environments.| Spherical Cow Consulting
A couple of recent UK government announcements indicate a renewed interest in a more substantial “government transformation” than the website-government model of recent years. The state…| New tech observations from the UK (ntouk)
“The adoption of Digital Company ID has the potential to drive growth and foster greater economic prosperity.” The UK’s Centre for Finance, Innovation and Technology (CFIT) has announced plans to […]| ID Tech
For some time now I’ve used “Is a liminal space” as my tagline and it has always intrigued me how people latch on to the…| Is a Liminal Space
A Digital ID Wallet is a secure mobile app that digitally stores and manages your personal information and identity.| Identity
On a recent Global Government Forum webinar, experts from Europe and the US shared their experience with digital ID and where the technology is heading next.| www.globalgovernmentforum.com
What is it with governments’ obsession with forms? Politicians have been promising us a “digital revolution” in the way government works since the mid-1990s. And yet here we are b…| New tech observations from the UK (ntouk)
Discover how AI is revolutionizing digital identity security, enhancing online safety, and addressing new challenges in today's digital world.| Spherical Cow Consulting
Digital footprints refer to the trail of data that individuals leave behind when they interact with the internet or digital devices.| Identity
Biometric authentication is a method of verifying a person's identity based on their unique biological traits.| Identity
Tech Wire Asia is an independent tech news website that covers enterprise and technology in Asia| Tech Wire Asia
The politician leading on the establishment of a federal digital ID system for Switzerland has said that government authorities “need more time” to process technology and cost considerations before confirming […]| www.globalgovernmentforum.com
We the people have the power to cripple the central planners' financial takeover by accomplishing four simple steps outlined in this report.| coreysdigs.com
Are we are own worst enemy? The post Reusable KYC: when a dedication to decentralization self-sabotages appeared first on Philip Sheldrake.| Philip Sheldrake
The paper falls far short in its appreciation for human-centred design, and this is quite typical of contemporary approaches to digital identity. The post Once more with meaning — a review of a draft industry paper on human-centric digital identity appeared first on Philip Sheldrake.| Philip Sheldrake
Dear lawmakers and regulators, this draft industry paper doesn't do the job. I explain why in the hope that you will act. The post Live or DIE — a review of a draft industry paper on the harms of SSI appeared first on Philip Sheldrake.| Philip Sheldrake
The point of failure is precisely where Web3 technology meets you and me. We must change our approach, not just to avoid failure, but to fully explore and expand the gifts of being human. The post Web3’s future #fail is avoidable appeared first on Philip Sheldrake.| Philip Sheldrake
First published to the AKASHA blog. Manning Publications has just published "Self-Sovereign Identity: Decentralized digital identity and verifiable credentials". Congratulations to the co-editors, Alex Preukschat and Drummond Reed, for getting 24 chapters, 5 appendices, and a further 11 online-only chapters out the door. No mean feat. My copy will drop on the doormat any day […] The post Self-Sovereign Identity — the book, the dystopia appeared first on Philip Sheldrake.| Philip Sheldrake
I was in Europe for the past week and half, ending up in Leuven, Belgium to speak at the Twiist.be conference. The topic of my talk was “The Open, Social Web.” (PDF) http://static.slidesharecdn.com/swf/ssplayerd.swf?doc=thedisoproject-090515121321-phpapp02&rel=0&stripped_title=the-open-social-web At first I struggled to develop a compelling or sensible narrative for the talk — as there is so much to it … Continue reading "The open, social web"| Factory Joe
I’d originally intended to respond to Joshua Schacter’s post about URL shorteners and how they’re merely the tip of the data iceberg, but since I missed that debate, Google has fortuitously plied me with an even better example by releasing custom profile URLs today. My point is to reiterate one of Tim O’Reilly’s ever-prescient admonishments … Continue reading "Google Profiles, namespace lock-in & social search"| Factory Joe
Let me state the problem plainly: in order to provide better service, it helps to know more about your customer, so that you can more effectively anticipate and meet her needs. But, pray tell, how do you learn about or solicit such information over the course of your first interaction? Moreover, how do you go … Continue reading "Portable Profiles & Preferences on the Citizen-Centric Web"| Factory Joe
Prompted by posts by Randy Reddig and Tony Stubblebine and a conversation with Elliott Kember, I wanted to address, yet again, the big fat stinking elephant in the room: OpenID usability and the paradox of choice. Elliott proposed a pretty clear picture of what he thinks OpenID should look like on StackOverflow, given the relative … Continue reading "Does OpenID need to be hard?"| Factory Joe
I’ll be attending the upcoming Internet Identity Workshop (IIW) May 18-20, 2009 at the Computer History Museum in Mountain View, California. The event started in 2005 and has become a staple …| Factory Joe
We close out our Setting Course series this week with Carrie Jaquith, Global Head of Digital Product at Abaxx Technologies. David Greely sits down with…| SmarterMarkets™
Sharing perspectives and insights towards a healthy web, naturally.| Generative Identity
This blog post provides an overview of the verifiable credentials landscape, helping you to understand formats, protocols & the tech used.| Spherical Cow Consulting
Banks, digital identity, and government have a long and mixed history. The UK government first started exploring the option of using banks in the 1990s, experimenting with identity verification and…| New tech observations from the UK (ntouk)
The point of failure is precisely where Web3 technology meets you and me. We must change our approach, not just to avoid failure, but to fully explore and expand the gifts of being human.| Generative Identity
If the modern ‘problem of identity’ was how to construct an identity and keep it solid and stable, the postmodern ‘problem of identity’ is primarily how to avoid fixation and keep the options open. (Bauman 2011)| Generative Identity
The innovations created in the name of SSI need not deliver the dystopia their SSI form promises.| Generative Identity
Phil Windley claims that a technology stack consisting of self-sovereign identity (SSI) and related technologies has all the qualities of generativity.| Generative Identity
Covering systems thinking and context, agency, hard borders, trust, trust triangles, and governance.| Generative Identity
Re-posting here in the hope that such discussions continue and a shared language and understanding is co-created around these topics.| Generative Identity
Misinformation sometimes gets a foothold and spreads across the digital identity oriented forums. A most recent piece that is percolating is: the Verifiable Credential (VC) Data Model 2.0, which is under development within a formal W3C working group, does not or will not support JSON. What is true: W3C VC 2.0 is 100% capable of […]| Identity Woman
As an enthusiastic member of the RadicalxChange community, I have actively participated in numerous RxC forums including working with the team to produce their 2022 conference series. I was in Zurich for the Digital Identity unConference Europe (DICE) that I co-produced and co-facilitated. Folks who organized the RxC Zurich/Switzerland asked me to be the featured […]| Identity Woman