What is Consent Receipt?

It’s midnight. Rushed by a deadline you must buy a rare gadget online and the only place where it is in stock is a web store you never used before. As is the common practice, you must create a user … Read More

Featured Post

Common Sense Privacy

Here I am, writing down my personal information to an online service that I heard from my friend. I’ve gotten familiar with the brand new online service (year 2000) and products they sell, and as it happens, I do need … Read More

Featured Post

Cyber Security vs User Experience

Cyber security is often seen as the opposite of user experience. Good security means inferior user experience. In the digital world that we are part of, creating the best practical user experience is critical to businesses. According to a study … Read More

Featured Post

Single Sign-On vs Step-up Authentication

When delivering online services to your customers, there are two terms that come up quite often that might require some explanation through comparison. Single Sign-On and Step-up authentication are technologies to help your customers navigate your applications. Visually, Single Sign-On … Read More

Featured Post

Why Smart Cities Services Need Federated Access

Clean sidewalks, safe roads, green parks, pure air. That is the dream of a city in which their inhabitants enjoy walking, jogging, commuting, sightseeing, meeting people at the boulevard. But, what happens when the cities grow at a such unstoppable … Read More

Featured Post

European e-privacy regulation

As the name says, the European e-privacy regulation, replaces the 2002 (revised, 2009) e-privacy directive with a new instrument, turning a directive into a regulation. As a reminder, directive is a regulatory instrument that has to be implemented in each … Read More

Featured Post

API Security and CIAM

While browsing through LinkedIn, I came across this table in a post from Mark O’Neill, an analyst from Gartner. Looking at his very brief post promoting their $195 research note, I realised that at least one third of (their) view … Read More

Featured Post
Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

Featured Post
100th year of independence

Birth of a Nation

Finland was born 99 years and 364 days ago. Tomorrow we celebrate our 100th year of independence. Finland separated from the Russian empire during their own revolution, and was eventually recognised as an independent nation by their leader, Vladimir Lenin … Read More

Featured Post
What is federation?

Federation Networks

We have quite a few articles that discuss different aspects of federation. We’ve provided you with the basic information, talked about the differences between an older protocol (SAML) and the new(er) kid on the block (OAuth), and introduced you to … Read More

Featured Post