Appropriate Identity

A lot of online services today take advantage of social media identities. You can start using a subscription service such as Spotify or Viaplay service with your Facebook identity. Social media identities minimize friction in adopting new consumer services. The … Read More

Featured Post

IETF 101 London

About IETF The IETF is the premier internet standards body developing open standards through open processes. While most IETF work takes place online, meetings provide in-person opportunities to advance work. My last IETF meeting was 48th in Pittsburgh in summer … Read More

Featured Post

What is Consent Receipt?

It’s midnight. Rushed by a deadline you must buy a rare gadget online and the only place where it is in stock is a web store you never used before. As is the common practice, you must create a user … Read More

Featured Post

Common Sense Privacy

Here I am, writing down my personal information to an online service that I heard from my friend. I’ve gotten familiar with the brand new online service (year 2000) and products they sell, and as it happens, I do need … Read More

Featured Post

Cyber Security vs User Experience

Cyber security is often seen as the opposite of user experience. Good security means inferior user experience. In the digital world that we are part of, creating the best practical user experience is critical to businesses. According to a study … Read More

Featured Post

Single Sign-On vs Step-up Authentication

When delivering online services to your customers, there are two terms that come up quite often that might require some explanation through comparison. Single Sign-On and Step-up authentication are technologies to help your customers navigate your applications. Visually, Single Sign-On … Read More

Featured Post

Why Smart Cities Services Need Federated Access

Clean sidewalks, safe roads, green parks, pure air. That is the dream of a city in which their inhabitants enjoy walking, jogging, commuting, sightseeing, meeting people at the boulevard. But, what happens when the cities grow at a such unstoppable … Read More

Featured Post

European e-privacy regulation

As the name says, the European e-privacy regulation, replaces the 2002 (revised, 2009) e-privacy directive with a new instrument, turning a directive into a regulation. As a reminder, directive is a regulatory instrument that has to be implemented in each … Read More

Featured Post

API Security and CIAM

While browsing through LinkedIn, I came across this table in a post from Mark O’Neill, an analyst from Gartner. Looking at his very brief post promoting their $195 research note, I realised that at least one third of (their) view … Read More

Featured Post
Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

Featured Post