Just add trust...to transact
In a previous article, I talked about how we need to build a smart identity for a smart city. The article, hopefully, pointed to building a perspective on what smart actually means. But, smart cities are built up from many smart pieces. These ‘smart pieces’ are really just an evolution of our current critical infrastructures…
Read more
Human beings love cities, well many of us do. We love them so much that the United Nations are predicting that by 2050, 66% of us will live in them. So how do to make sure that all of those people are housed, have clean water, can get into and out of the city easily,…
Read more
Security is a very wide subject. If we pare it down to cybersecurity, it still covers everything from the wanton damage of IT systems to espionage to data breaches. Security touches all points in a system, from the human operator out to the Cloud and beyond. Cybersecurity is a fundamental aspect of an identity system.…
Read more
Identity and access management has become a bit of a beast. It has gone from a system that was contained within an Enterprise, usually directory driven, for very controlled purposes, to something that impinges upon almost every aspect of our daily lives. This has been driven by a number of factors: Cloud computing changing the…
Read more
The General Data Protection Directive GDPR which comes into force on May 25, 2018, may well be the most written about directive ever. There is a reason for this. It is complicated, involves data, and it cuts across country boundaries like Attila the Hun could never achieve. I recently did a webinar on GDPR, hoping…
Read more
The story of a blockchain that may not break, but will bend. If you’re of a certain age, you will remember the dot-com revolution back in the day. I remember sitting in a meeting with the CEO of the company I was working with at the time. He sat across the table with about 5…
Read more
If you wake up in a cold sweat in the middle of the night with the letters GDPR floating just above your bed, then fear not, Customer Identity Access Management CIAM is your knight in shining armor. I don’t need to tell those of you working with personal data that the GDPR is nuanced and…
Read more
Just uttering the words General Data Protection Regulation (GDPR) is almost enough to make grown adults faint. The GDPR is the updated and more stringent version of the European Union Data Protection Directive 95/46 EC which goes back to 1995. Things have changed a lot since the nineties. For one thing, the Internet in 1995…
Read more
Creating persistent identities, that are validated or uplifted to the right trust levels for commerce, is key to services like online banking. This is meet by building relationships that deliver ‘Identity with Assurance’ as well as offering Data and Services Brokers, and Personal Data Management. This is all done under user consent, to supply information…
Read more
Avoco has been working in the field of identity management for about 8 years now. Our history, however, was much more in the area of information security. We originated in the encryption/rights management space, seeing identity originally as a means to an end – access control. We moved over to full-time Identity Access Management…
Read more