decentralized identity

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data

Introduction As Chief Information Officer (CIO) or Customer Identity and Access Management (CIAM) leader, it’s essential to understand the current nature of how organizations collect personal data about their consumers, which includes both direct and indirect methods such as tracking cookies, social media mining, customer surveys, and purchase history analysis. While this wealth of data

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data Read More »

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks

April 25, 2023 Introduction As a cybersecurity professional, I’ve seen firsthand how important it is for businesses to have strong customer identity and access management (CIAM) systems in place. These systems allow companies to provide secure access to their products and services, while also protecting their customers’ sensitive information. However, with the rise of sophisticated

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks Read More »

abstract close up cobweb connection

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game

In this article, I’ll discuss the advantages of using graph databases over LDAP for metadata labeling and verification. Verifying identity data, either by using a third-party verification or some internal mechanism, allows you to trust the data you have and use it for potentially higher-risk transactions. That’s where graph databases come in, as they offer

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game Read More »

a person sitting on the floor with vr goggles using a computer

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems

Introduction The digital landscape has undergone a significant transformation in the way we transact and verify our identities. Digital wallets have facilitated this change by combining the traditional roles of physical wallets and ID cards into a single, convenient digital platform. In this blog post, we will explore the thesis that digital wallets are becoming

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems Read More »

close up photo of a stethoscope

The Future of CIAM – Part 4 

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification What is identity onboarding? Identity onboarding is the process of gathering and verifying an individual’s identity and personal information when they sign up for a service or open an account with an organization. The purpose of identity onboarding is to ensure

The Future of CIAM – Part 4  Read More »

Driver's Licence - Issued to Archibald Gordon Maclaurin, Essex County Council, 4 Mar 1927

Part 3 – The Future of CIAM

Harnessing the Power of Verifiable Credentials Welcome to Part 3 of our guide to Modern Consumer Identity and Access Management (CIAM) Platform! In this installment, we’ll be discussing the use cases and industries impacted by decentralized identity and verifiable credentials. Decentralized identity and verifiable credentials have become hot topics in the tech world as they

Part 3 – The Future of CIAM Read More »

Scroll to Top