News

Just add trust...to transact

Created with Sketch.

The Cloud’s the Limit for Secure, Complaint, Identity Storage, and Personal Data

Back in 2009, I gave a talk about Cloud identity. It went down, less like a fluffy Cloud and more like a lead balloon. It was too early – way too early. But as we reach peak Cloud adoption, with rates of uptake reaching 93%, the sky’s the limit for digital identity. Cloud computing has…
Read more

What Happens If… Disaster Recovery for the Smart City and Beyond

Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too…
Read more

Data as a Smart Superstructure: A Warning to the Wise

In a previous article, I talked about how we need to build a smart identity for a smart city. The article, hopefully, pointed to building a perspective on what smart actually means. But, smart cities are built up from many smart pieces. These ‘smart pieces’ are really just an evolution of our current critical infrastructures…
Read more

Identity and The Smart City

Human beings love cities, well many of us do. We love them so much that the United Nations are predicting that by 2050, 66% of us will live in them. So how do to make sure that all of those people are housed, have clean water, can get into and out of the city easily,…
Read more

Is Privacy The New Security?

Security is a very wide subject. If we pare it down to cybersecurity, it still covers everything from the wanton damage of IT systems to espionage to data breaches. Security touches all points in a system, from the human operator out to the Cloud and beyond. Cybersecurity is a fundamental aspect of an identity system.…
Read more

Microservices for IAM: Container Security and Personal Data

Identity and access management has become a bit of a beast. It has gone from a system that was contained within an Enterprise, usually directory driven, for very controlled purposes, to something that impinges upon almost every aspect of our daily lives. This has been driven by a number of factors: Cloud computing changing the…
Read more

May The Forces be With You: Using IPaaS for IAM and GDPR

The General Data Protection Directive GDPR which comes into force on May 25, 2018, may well be the most written about directive ever. There is a reason for this. It is complicated, involves data, and it cuts across country boundaries like Attila the Hun could never achieve. I recently did a webinar on GDPR, hoping…
Read more

Trust and the Blockchain

The story of a blockchain that may not break, but will bend. If you’re of a certain age, you will remember the dot-com revolution back in the day. I remember sitting in a meeting with the CEO of the company I was working with at the time. He sat across the table with about 5…
Read more

Identity Data in the World of GDPR

If you wake up in a cold sweat in the middle of the night with the letters GDPR floating just above your bed, then fear not, Customer Identity Access Management CIAM is your knight in shining armor. I don’t need to tell those of you working with personal data that the GDPR is nuanced and…
Read more

Hacking The GDPR

Just uttering the words General Data Protection Regulation (GDPR) is almost enough to make grown adults faint. The GDPR is the updated and more stringent version of the European Union Data Protection Directive 95/46 EC which goes back to 1995. Things have changed a lot since the nineties. For one thing, the Internet in 1995…
Read more