Single Sign-On vs Step-up Authentication

When delivering online services to your customers, there are two terms that come up quite often that might require some explanation through comparison. Single Sign-On and Step-up authentication are technologies to help your customers navigate your applications. Visually, Single Sign-On … Read More

API Security and CIAM

While browsing through LinkedIn, I came across this table in a post from Mark O’Neill, an analyst from Gartner. Looking at his very brief post promoting their $195 research note, I realised that at least one third of (their) view … Read More

Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

IAM and Industrial Internet – Strong device identities

When it comes to IoT, it is paramount to distinguish between authentication and authorisation. Typically, there are long discussions centred around device identities – authentication – while managing their access rights waved by one sentence such as “the portal will … Read More

Strong Authentication and Digital Transformation

The larger concept, digital transformation, that encompasses digital business, online services, mobile apps, multi- or omni-channel solutions, IoT, require strong customer authentication to succeed. If it is not already become obvious to you – you should avoid deploying weak identities, … Read More

LIGHTest blog

Recap on the LIGHTest Trust Infrastructure Developments

A few hours in an airplane provides a great opportunity for spending a few moments on reflecting where the Trust Infrastructure project LIGHTest is heading now Flying home from a LIGHTest Consortium Meeting in Graz, Austria I’m overwhelmed with the … Read More

LIGHTest blog

The LIGHTest Project will deliver heavily

This series of blogs is about selected R&D efforts of special interest or where Ubisecure participates. This article is about LIGHTest, which is a project that is partially funded by the European Commission as an Innovation Action in the Horizon2020 … Read More

Authentication as a Gatekeeper

Your authentication solution is your gatekeeper. It will enable your customers to conduct business with you while keeping others out. There are a lot of different gatekeepers out there in the market. If your organisation has an online service for … Read More

eIDAS as a business driver for online commerce in Europe?

One of the challenges business have in managing their digital transformation is the concern about security and regulatory repercussions of electronic signing of contract documents. From September 2018, the use of electronic identification (eID) and signatures will become a (much more usable) … Read More

Digital Identity

3 Basic Mistakes in Digitalisation

Digitalisation is one of those words you hear constantly. Gartner defines digitalisation as follows: “Digitalisation is the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to … Read More