If one principal can do anything, one mistake can undo everything. I’ve read too many incident reviews where the “automation user” turned out to be the attacker’s best friend. One token. All the doors. Code, artifacts, production. We built CI/CD to go fast. We accidentally made it the fastest path to a breach. Just like...| Identity Defined Security Alliance
Most companies are creating massive security blind spots by forcing AI agents into human identity systems. Shared accounts and static permissions put your digital workforce at risk.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Every day, people use official government documents like passports or driving licences to prove things about themselves in the economy. However, these physical documents weren’t designed for the digital age. This is why, through the Data (Use and Access) Act, …| enablingdigitalidentity.blog.gov.uk
This blog was originally published by Bravura Security here. A stark reality faces modern enterprises: 94% of cyber attacks now specifically target identity systems, not traditional network defenses. As threats rapidly evolve, organizations struggling with fragmented identity and access management (IAM), privileged and access management (PAM), and password management architectures face increasing risk from sophisticated...| Identity Defined Security Alliance
Your firewall can't protect data from rogue admins or compromised systems. TEEs create hardware-secured "safe rooms" inside processors - protecting your most sensitive information even when everything else fails. Here's why every business needs to understand this game-changing technology.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
State officials from 6 leading US states discuss mobile driver's license adoption, use cases, and resident satisfaction at the Federal mDL Industry Day.| OpenID Foundation - Helping people assert their identity wherever they choose
Today we’ve published a call for views on the adoption of trust services. You can respond to the call for views on GOV.UK until the 20th of September 2025. What are trust services? Trust services are digital tools, such as …| Enabling digital identity
We’ve been asked variously for some kind of document with a gap analysis or assimilation matrix. We don't have one. This is why.| Enabling digital identity
Trusted and secure digital identity services have a vital role in enabling productivity and growth within the financial services sector, offering process efficiencies and helping to combat identity fraud. Over the past few years, we’ve heard from sector firms about …| enablingdigitalidentity.blog.gov.uk
Switzerland’s Federal Statistical Office and the Global Legal Entity Identifier Foundation (GLEIF) have teamed up to integrate business registry data directly into the Legal Entity Identifier (LEI) records of Swiss businesses. GLEIF is a non-profit organisation that oversees and champions the use of Legal Entity Identifier (LEIs) – 20-character alpha-numeric codes that enable unique identification of […]|
Master login security with expert insights from building identity systems serving millions of users. This comprehensive guide covers password managers, two-factor authentication, phishing protection, Wi-Fi security, and advanced strategies to safeguard your digital identity and accounts.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
This deal represents the maturation of the identity market. The days of pure-play identity vendors competing primarily on features are ending. The future belongs to integrated security platforms with identity as a core pillar.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Gail Hodges, Executive Director OpenID Foundation Today the OIDF is proud to announce that the OpenID for Verifiable Credential Issuance (OpenID4VCI) specification has proven interoperability through the pairwise testing of seven issuers and five wallets providers from around the world. The clear evidence of interoperability is a meaningful and timely result as this specification moves […] The post OpenID Foundation demonstrates real-world interoperability of new Digital Identity Issuan...| OpenID Foundation
The OpenID Foundation has launched a new Ecosystems Support Community Group (ESCG) to help public and private sector ecosystem leaders understand the key architectures, decisions, and best practices at the forefront of open banking/open data and digital identity adoption globally. Context The ESCG arrives at a critical time when 90+ jurisdictions are pursuing open banking/open […] The post OIDF launches Ecosystems Support Community Group first appeared on OpenID Foundation.| OpenID Foundation
The OpenID Foundation’s Strategy and Marketing Director, Elizabeth Garber, attended DPI (Digital Public Infrastructure) Day as a member of the 2025 DPI Safeguards Working Group, which operates within the United Nations Development Programme and the Office for Digital and Emerging Technologies. Her extensive background with multi-stakeholder communities like SIDI Hub, which advances safe, interoperable identity […] The post UN’s DPI Day: Elizabeth Garber on standards as safeguards firs...| OpenID Foundation
OIDF leads discussion at IGF 2025 on balancing digital identity interoperability with sovereignty for developing countries, with ey insights on inclusion.| OpenID Foundation - Helping people assert their identity wherever they choose
You want to tell people that your service is certified and on the GOV.UK register of digital identity and attribute services. What should you say and what shouldn't you?| Enabling digital identity
Today, we’ve published the findings from the second annual digital identity inclusion monitoring report. The report helps to monitor inclusion and accessibility in the certified digital identity market over time. You can read the full report on GOV.UK. The government …| enablingdigitalidentity.blog.gov.uk
The gamma (0.4) publication of the UK digital identity and attributes trust framework introduces certification for "component services". You don't have to use certified components – but you'll probably want to.| Enabling digital identity
The final publication of the ‘gamma’ (0.4) UK digital identity and attributes trust framework, and updated supplementary codes are now live on GOV.UK.| Enabling digital identity
This blogpost explains the new approach to certification of white label services against the gamma (0.4) trust framework.| Enabling digital identity
This blogpost explains how service providers who are already certified against the trust framework can ‘uplift’ to the new version.| Enabling digital identity
On 19 June, the Data (Use and Access) Act received Royal Assent. This is a major milestone for the government’s work to make sure individuals and businesses across the UK have access to trusted digital identity services when they want to use them| enablingdigitalidentity.blog.gov.uk
This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance...| Identity Defined Security Alliance
Open standards are the backbone of interoperable digital identity. Here's what that really means and why the details matter more than ever.| Spherical Cow Consulting
Power, Paychecks, and Pressure The amateur era is over. With the NCAA’s $2.8 billion settlement now approved, student-athletes are no longer playing only for scholarships. Real money is on the table, and so are real legal consequences. This shift isn’t just about opportunity. It’s about risk. Athletes are signing contracts that look more like professional […] The post NIL Contracts Are Getting Smarter and Riskier: Legal Moves Every Athlete Should Make first appeared on Traverse ...| Traverse Legal
The paper falls far short in its appreciation for human-centred design, and this is quite typical of contemporary approaches to digital identity.| Generative Identity
Learn why businesses should adopt digital credentials and how they combat fraud while navigating complex environments.| Spherical Cow Consulting
A couple of recent UK government announcements indicate a renewed interest in a more substantial “government transformation” than the website-government model of recent years. The state…| New tech observations from the UK (ntouk)
“The adoption of Digital Company ID has the potential to drive growth and foster greater economic prosperity.” The UK’s Centre for Finance, Innovation and Technology (CFIT) has announced plans to […]| ID Tech
For some time now I’ve used “Is a liminal space” as my tagline and it has always intrigued me how people latch on to the…| Is a Liminal Space
A Digital ID Wallet is a secure mobile app that digitally stores and manages your personal information and identity.| Identity
On a recent Global Government Forum webinar, experts from Europe and the US shared their experience with digital ID and where the technology is heading next.| www.globalgovernmentforum.com
What is it with governments’ obsession with forms? Politicians have been promising us a “digital revolution” in the way government works since the mid-1990s. And yet here we are b…| New tech observations from the UK (ntouk)
Discover how AI is revolutionizing digital identity security, enhancing online safety, and addressing new challenges in today's digital world.| Spherical Cow Consulting
Digital footprints refer to the trail of data that individuals leave behind when they interact with the internet or digital devices.| Identity
Biometric authentication is a method of verifying a person's identity based on their unique biological traits.| Identity
Our Summer Playlist rolls on this week with Michelle Finneran Dennedy, CEO of PrivacyCode.AI. David Greely sits down with Michelle to discuss privacy in the age of data as a highly valuable commodity – and the focus we need to be putting on data supply chains and the data industry in the wake of the […]| SmarterMarkets™
Tech Wire Asia is an independent tech news website that covers enterprise and technology in Asia| Tech Wire Asia
The politician leading on the establishment of a federal digital ID system for Switzerland has said that government authorities “need more time” to process technology and cost considerations before confirming […]| www.globalgovernmentforum.com
We the people have the power to cripple the central planners' financial takeover by accomplishing four simple steps outlined in this report.| coreysdigs.com
Are we are own worst enemy? The post Reusable KYC: when a dedication to decentralization self-sabotages appeared first on Philip Sheldrake.| Philip Sheldrake
The paper falls far short in its appreciation for human-centred design, and this is quite typical of contemporary approaches to digital identity. The post Once more with meaning — a review of a draft industry paper on human-centric digital identity appeared first on Philip Sheldrake.| Philip Sheldrake
Dear lawmakers and regulators, this draft industry paper doesn't do the job. I explain why in the hope that you will act. The post Live or DIE — a review of a draft industry paper on the harms of SSI appeared first on Philip Sheldrake.| Philip Sheldrake
The point of failure is precisely where Web3 technology meets you and me. We must change our approach, not just to avoid failure, but to fully explore and expand the gifts of being human. The post Web3’s future #fail is avoidable appeared first on Philip Sheldrake.| Philip Sheldrake
First published to the AKASHA blog. Manning Publications has just published "Self-Sovereign Identity: Decentralized digital identity and verifiable credentials". Congratulations to the co-editors, Alex Preukschat and Drummond Reed, for getting 24 chapters, 5 appendices, and a further 11 online-only chapters out the door. No mean feat. My copy will drop on the doormat any day […] The post Self-Sovereign Identity — the book, the dystopia appeared first on Philip Sheldrake.| Philip Sheldrake
I was in Europe for the past week and half, ending up in Leuven, Belgium to speak at the Twiist.be conference. The topic of my talk was “The Open, Social Web.” (PDF) http://static.slidesharecdn.com/swf/ssplayerd.swf?doc=thedisoproject-090515121321-phpapp02&rel=0&stripped_title=the-open-social-web At first I struggled to develop a compelling or sensible narrative for the talk — as there is so much to it … Continue reading "The open, social web"| Factory Joe
I’d originally intended to respond to Joshua Schacter’s post about URL shorteners and how they’re merely the tip of the data iceberg, but since I missed that debate, Google has fortuitously plied me with an even better example by releasing custom profile URLs today. My point is to reiterate one of Tim O’Reilly’s ever-prescient admonishments … Continue reading "Google Profiles, namespace lock-in & social search"| Factory Joe
Let me state the problem plainly: in order to provide better service, it helps to know more about your customer, so that you can more effectively anticipate and meet her needs. But, pray tell, how do you learn about or solicit such information over the course of your first interaction? Moreover, how do you go … Continue reading "Portable Profiles & Preferences on the Citizen-Centric Web"| Factory Joe
Prompted by posts by Randy Reddig and Tony Stubblebine and a conversation with Elliott Kember, I wanted to address, yet again, the big fat stinking elephant in the room: OpenID usability and the paradox of choice. Elliott proposed a pretty clear picture of what he thinks OpenID should look like on StackOverflow, given the relative … Continue reading "Does OpenID need to be hard?"| Factory Joe
I’ll be attending the upcoming Internet Identity Workshop (IIW) May 18-20, 2009 at the Computer History Museum in Mountain View, California. The event started in 2005 and has become a staple …| Factory Joe
We close out our Setting Course series this week with Carrie Jaquith, Global Head of Digital Product at Abaxx Technologies. David Greely sits down with…| SmarterMarkets™
Sharing perspectives and insights towards a healthy web, naturally.| Generative Identity
This blog post provides an overview of the verifiable credentials landscape, helping you to understand formats, protocols & the tech used.| Spherical Cow Consulting
Banks, digital identity, and government have a long and mixed history. The UK government first started exploring the option of using banks in the 1990s, experimenting with identity verification and…| New tech observations from the UK (ntouk)
The point of failure is precisely where Web3 technology meets you and me. We must change our approach, not just to avoid failure, but to fully explore and expand the gifts of being human.| Generative Identity
If the modern ‘problem of identity’ was how to construct an identity and keep it solid and stable, the postmodern ‘problem of identity’ is primarily how to avoid fixation and keep the options open. (Bauman 2011)| Generative Identity
The innovations created in the name of SSI need not deliver the dystopia their SSI form promises.| Generative Identity
Phil Windley claims that a technology stack consisting of self-sovereign identity (SSI) and related technologies has all the qualities of generativity.| Generative Identity
Covering systems thinking and context, agency, hard borders, trust, trust triangles, and governance.| Generative Identity
Re-posting here in the hope that such discussions continue and a shared language and understanding is co-created around these topics.| Generative Identity
Misinformation sometimes gets a foothold and spreads across the digital identity oriented forums. A most recent piece that is percolating is: the Verifiable Credential (VC) Data Model 2.0, which is under development within a formal W3C working group, does not or will not support JSON. What is true: W3C VC 2.0 is 100% capable of […]| Identity Woman
As an enthusiastic member of the RadicalxChange community, I have actively participated in numerous RxC forums including working with the team to produce their 2022 conference series. I was in Zurich for the Digital Identity unConference Europe (DICE) that I co-produced and co-facilitated. Folks who organized the RxC Zurich/Switzerland asked me to be the featured […]| Identity Woman