By Ken Ebert Everyone’s online life begins with a user account, a login, and a password, which combined, turns into an identity. I am my email address — or social media account login. For the past twenty five years, life online has evolved by accumulating these...
SEARCH FOR ANY TOPICS HERE
Secure, Two-Way Communication is Decentralized Identity’s Secret Sauce to Stopping Financial Scams
In a world of scammers attempting to separate people from their hard-earned money, the next step in security is to be able to automatically verify who you are talking to before you tell them anything.By Tim Spring As of 2022, Forbes reports that 78% of American adults...
What We Can Learn from the History of Digital Trust
Why was the internet built without an emphasis on identity or security? Why are we still trying to figure these out 50 years later? What role will AI play in the future of digital trust? Let's take a brief look at the history of the internet and see what we can...
Decentralization and the Future of Enterprise Security
The pandemic fundamentally changed the architecture of cyber security— now organizations must adapt to survive and eventually thriveBy Dr. Chase Cunningham Ph.D Imagine a wall with a gate. The gate allows you to monitor and decide who you let inside the wall. It’s...
Security Focused Market Signals
In this article we take a look at and keep you updated on some of the biggest security news in today’s digital identity space.By Tim Spring Six Takeaways from Gartner® Hype Cycle™ for Digital Identity, 2022 KeyFactor recently looked at key insights from the Gartner...