The Password Must Go

The world is full of good ideas and inventions that reflect the time when they surfaced. Only later we discover that they were actually very bad ones. Tobacco was something back in the day – until we discovered that it … Read More

Appropriate Identity

A lot of online services today take advantage of social media identities. You can start using a subscription service such as Spotify or Viaplay service with your Facebook identity. Social media identities minimize friction in adopting new consumer services. The … Read More

Single Sign-On vs Step-up Authentication

When delivering online services to your customers, there are two terms that come up quite often that might require some explanation through comparison. Single Sign-On and Step-up authentication are technologies to help your customers navigate your applications. Visually, Single Sign-On … Read More

API Security and CIAM

While browsing through LinkedIn, I came across this table in a post from Mark O’Neill, an analyst from Gartner. Looking at his very brief post promoting their $195 research note, I realised that at least one third of (their) view … Read More

Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

IAM and Industrial Internet – Strong device identities

When it comes to IoT, it is paramount to distinguish between authentication and authorisation. Typically, there are long discussions centred around device identities – authentication – while managing their access rights waved by one sentence such as “the portal will … Read More

Strong Authentication and Digital Transformation

The larger concept, digital transformation, that encompasses digital business, online services, mobile apps, multi- or omni-channel solutions, IoT, require strong customer authentication to succeed. If it is not already become obvious to you – you should avoid deploying weak identities, … Read More

LIGHTest blog

Recap on the LIGHTest Trust Infrastructure Developments

A few hours in an airplane provides a great opportunity for spending a few moments on reflecting where the Trust Infrastructure project LIGHTest is heading now Flying home from a LIGHTest Consortium Meeting in Graz, Austria I’m overwhelmed with the … Read More

LIGHTest blog

The LIGHTest Project will deliver heavily

This series of blogs is about selected R&D efforts of special interest or where Ubisecure participates. This article is about LIGHTest, which is a project that is partially funded by the European Commission as an Innovation Action in the Horizon2020 … Read More

Authentication as a Gatekeeper

Your authentication solution is your gatekeeper. It will enable your customers to conduct business with you while keeping others out. There are a lot of different gatekeepers out there in the market. If your organisation has an online service for … Read More