March 2023

a person sitting on the floor with vr goggles using a computer

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems

Introduction The digital landscape has undergone a significant transformation in the way we transact and verify our identities. Digital wallets have facilitated this change by combining the traditional roles of physical wallets and ID cards into a single, convenient digital platform. In this blog post, we will explore the thesis that digital wallets are becoming […]

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems Read More »

ambulance architecture building business

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j

At a major medical center, managing access to sensitive patient health information is a critical concern. To ensure that patient data is protected, the center has implemented a Relationship-Based Access Control (ReBAC) system using Neo4j, which provides a flexible and granular approach to managing access control. The ReBAC system includes four key roles: doctors, patients,

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j Read More »

close up photo of a stethoscope

The Future of CIAM – Part 4 

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification What is identity onboarding? Identity onboarding is the process of gathering and verifying an individual’s identity and personal information when they sign up for a service or open an account with an organization. The purpose of identity onboarding is to ensure

The Future of CIAM – Part 4  Read More »

Driver's Licence - Issued to Archibald Gordon Maclaurin, Essex County Council, 4 Mar 1927

Part 3 – The Future of CIAM

Harnessing the Power of Verifiable Credentials Welcome to Part 3 of our guide to Modern Consumer Identity and Access Management (CIAM) Platform! In this installment, we’ll be discussing the use cases and industries impacted by decentralized identity and verifiable credentials. Decentralized identity and verifiable credentials have become hot topics in the tech world as they

Part 3 – The Future of CIAM Read More »

What are the various privacy laws around the world

Privacy laws are legal frameworks that regulate the collection, use, and disclosure of personal information by organizations. The purpose of these laws is to protect individuals’ privacy and personal data from misuse, abuse, or unauthorized access. Privacy laws can take various forms, including federal, state, or local laws, as well as industry-specific regulations. Some of

What are the various privacy laws around the world Read More »

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification – Part 2

As digital transactions become more ubiquitous, the need for secure and efficient identity onboarding and verification is more important than ever. Decentralized identity and verifiable credentials are two emerging technologies that have the potential to revolutionize the way we think about digital identity. In this article, we will discuss how decentralized identity and verifiable credentials

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification – Part 2 Read More »

Scroll to Top