Ask A [cybersecurity] FuturistWelcome to the inaugural “Ask a [cybersecurity] futurist column. This month’s question comes from Anna Borg.Sep 16, 2024Sep 16, 2024
NFTs, ICOs and Ownership of Creative IdeasIn my March 2022 Biometric Update column, I explained that NFTs are a big deal because they are a unique digital identity layer native to…Jun 6, 20221Jun 6, 20221
Six insights about the Future of BiometricsBiometrics are seen as a magic bullet to uniquely identify humans — but it is still new technology. Companies can experience growing pains…May 11, 2022May 11, 2022
Published inIn Present TenseThree Governments enabling digital identity interoperabilitySince 2016, a growing number of digital identity experts have worked together to create privacy preserving, digitally native, trusted…Oct 5, 2021Oct 5, 2021
A Call for Change at the CCGBelow is my self-nomination for one of three Co-Chairs of the Credentials Community Group at the W3C. Anyone can be a member of the group…May 27, 2020May 27, 2020
Published inIn Present TenseEnvisioning a Public-Private PartnershipThe Role of Robust Government in InnovationApr 9, 2020Apr 9, 2020
Published inIn Present TenseHow Supply Chain Enables Sustainable FashionAn Interview with Susanna SchickFeb 4, 2020Feb 4, 2020
Published inIn Present TenseGuanxi over IPThe Role of Counterfeiters in InnovationJan 28, 2020Jan 28, 2020
Published inIn Present TenseCan Supply Chain Transparency Save the World?I spent half of 2019 researching digital identity technologies that track goods on the supply chain. While I enjoyed the research, I didn’t…Jan 22, 2020Jan 22, 2020
Published inIn Present TenseIntroducing Sensors, Identifiers & Digital TwinsA Report on Tracking Identity on the Supply ChainJan 14, 2020Jan 14, 2020
Published inIn Present TenseMaskirovka, False Narratives and Information OperationsOr How I Learned to Stop Worrying and Love DisinformationJan 7, 20201Jan 7, 20201
Published inIn Present TenseExploring Vulnerabilities in the Digital Identity Security of Banking and FinanceDefining Digital Identity Security in the Age of the IoTDec 19, 2019Dec 19, 2019
Limitations of Standards BodiesHow a technology bias creates unnecessary unintended consequencesDec 10, 20191Dec 10, 20191
Published inIn Present TenseSupply Chain Transparency and Digitally Native DataFrom now until the New Year, ’tis the season when consumers far and wide rush to buy gifts for their loved ones…Dec 4, 2019Dec 4, 2019
Published inIn Present TenseAttack Vectors in the Context of Election SecurityLast week I announced The Purple Tornado’s report on Securing Voter Data Systems, alluding to the concepts of technical and social attack…Nov 21, 2019Nov 21, 2019
Published inIn Present TenseAnnouncing our Securing Voter Data reportPublic trust in the integrity of our elections has been critically shaken. U.S. adversaries are using a range of mechanisms to breed…Nov 12, 2019Nov 12, 2019
Published inIn Present TenseSolving CEO Fraud with 3 New Identity SolutionsHow could fraudsters convince the CEO and CFO of the Dutch company, Pathé to transfer almost 20M Euros to them? It wasn’t rocket science —…Oct 29, 20191Oct 29, 20191