This is 100% Secure – Information Security Myths

This blog is a step away from our usual Identity and Access Management topics and talks about a few points that people should do, or know, to be better equipped in this modern world of 1s and 0s. In recent … Read More

Featured Post

eIDAS as a business driver for online commerce in Europe?

One of the challenges business have in managing their digital transformation is the concern about security and regulatory repercussions of electronic signing of contract documents. From September 2018, the use of electronic identification (eID) and signatures will become a (much more usable) … Read More

Featured Post
IACA 2017

Identity Assurance in Electronic Transaction – presenting at the 40th IACA Annual Conference

I’m thrilled to be discussing Identity Assurance, at the 40th IACA Annual Conference in Halifax, Nova Scotia from May 21-25. In the first general session on the Tuesday – entitled CLEAR SAILING: IDENTITY ASSURANCE IN ELECTRONIC TRANSACTIONS, I will be … Read More

Featured Post
Preparing for GDPR

Preparing for General Data Protection Regulation (GDPR) – part III

Guest blogger Richard Hancock continues his series on GDPR preparation.   In my second blog on GDPR we mentioned two of the major mitigating preventative measures provisioned for within the GDPR – pseudonymising and encryption.  Today, we’re going to look … Read More

Featured Post
Digital Identity

3 Basic Mistakes in Digitalisation

Digitalisation is one of those words you hear constantly. Gartner defines digitalisation as follows: “Digitalisation is the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to … Read More

Featured Post

Mobile Connect Summit London 2017

“The time is now, let’s act together!” That was the theme and core messaging at the GSMA Mobile Connect Summit in London this week. Encouraging operators to work together nationally, and assist service providers to deliver great user experience came … Read More

Featured Post
Preparing for GDPR

Preparing for General Data Protection Regulation (GDPR) – part II

Guest blogger Richard Hancock continues his series on GDPR preparation.   In my last GDPR blog, I gave you an overall summary of the 2018 regulation.  Now I’m going to delve into some of the finer detail. Let’s start with … Read More

Featured Post

Luottamusverkosto

[A chance to see our beautiful language full of vowels in action! This is a blog article about the Finnish Trust Federation Network – Luottamusverkosto – that will become active in May 2017. There will be an English version available … Read More

Featured Post
Connected, federated, secured

Update for Ubisecure Identity Server

March release of the Identity platform includes Ubisecure Identity Server 8.1. This new version brings new application and privileged user management API calls, WS-Federation protocol and tiered delegated role management improvements. Mobile Connect For GSMA Mobile Connect ID Gateway deployments, the … Read More

Featured Post

What is a Legal Entity Identifier and what can you do with it?

The LEI (Legal Entity Identifier) is a 20-digit, alpha-numeric code based on an international standard (ISO 17442) primarily used to uniquely identify a Legal Entity (LE) party to a financial transaction.  For example, Ubisecure Oy’s Legal Entity Identifier is 529900T8BM49AURSDO55 – … Read More

Featured Post