Welcome to A Digital Identity Digest, brought to you by Heather Flanagan of Spherical Cow Consulting. Here, we explore the evolving world of digital identity on the web. This podcast is spearheaded by Heather's expertise, where she breaks down complex concepts, shares the latest trends, and provides insightful analyses in online identity management. Join Heather as she navigates this dynamic digital pasture, delivering content that's both informative and engaging for tech enthusiasts, digita ...
…
continue reading
This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation. While much of the analysis is rooted in developments across Europe, the series adopts ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
…
continue reading

1
The Digital Identity Podcast by SelfKey | Blockchain | Digital Identity | Decentralization |
SelfKey
Your data is concentrated in the hands of a few large institutions. They are storing information about your browsing history, shopping habits, location, bank statements, medical history, and more. With the rising threat of data breaches, security threats, and loss of privacy - your information is increasingly at risk because you do not own your identity. We believe there is a better way. You, the identity owner - should own and control your own information. Welcome to the future of self-sove ...
…
continue reading

1
The Blueprint for Global Digital Trust: Bridging the EU and Canada's Legal Divide on Digital IDs and Credentials
12:28
12:28
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:28A high-level workshop hosted in Ottawa, Canada, on October 6, 2025 took place, focusing on advancing digital collaboration, specifically regarding digital credentials and trust services, between the European Union (EU) and Canada. This event, which included policymakers and digital leaders, marked a significant step under the EU-Canada Digital Part…
…
continue reading

1
From Firefighting to Strategizing IT Security with Giles Thornton
16:06
16:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
16:06In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
…
continue reading
על ידי Heather Flanagan
…
continue reading

1
AI in Dispute Resolution - Ethical Roadblocks
7:50
7:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:50The integration of Artificial Intelligence into dispute resolution systems marks a pivotal shift in how justice is accessed and delivered. With the rise of On-Line Digital Resolution (ODR) platforms, AI technologies are increasingly used to facilitate intake, guide users, and predict outcomes. These innovations promise to streamline processes and r…
…
continue reading

1
Delegation and Consent: Who Actually Benefits?
11:54
11:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:54When not distracted by AI (which, you have to admit, is very distracting) I’ve been thinking a lot about delegation in digital identity. We have the tools that allow administrators or individuals grant specific permissions to applications and service. In theory, it’s a clean model.על ידי Heather Flanagan
…
continue reading

1
The Thorny Issue of Digital Sovereignty
12:01
12:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:01The issue of sovereignty is raising its head across the globe, but more so in the Western Hemisphere. As nations show a growing distrust of others, there is a realisation that their respective national interests must be resilient to outside threats and geopolitics. This extends to national and national-critical data and the processing of that data.…
…
continue reading

1
Pirates, Librarians, and Standards Development
7:50
7:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:50With the right motivation, even I will write a blog post on a dare. And the dare I got was to write a post about what librarians and pirate captains have in common, and why it matters for standards development. (If you can’t have fun when writing, what’s the point?)על ידי Heather Flanagan
…
continue reading

1
Agentic Risk Mitigation in the Era of the EU Digital Identity Wallet
13:07
13:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:07A critical dimension of this evolving Wallet landscape is the emergence of agentic workflows—processes driven by autonomous or semi-autonomous agents. These workflows can be broadly categorized into closed and open models, each presenting distinct challenges and implications for responsibility and liability.…
…
continue reading

1
Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill
11:21
11:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:21Google recently gave us something we’ve been waiting on for years: hard numbers on how much energy an AI prompt uses. According to their report, the median Gemini prompt consumes just 0.24 watt-hours of electricity — roughly running a microwave for a second — along with some drops of water for cooling.…
…
continue reading

1
Who Decides the Internet’s Trust Rules? Inside the CA/B Forum with Arvid Vermote
16:01
16:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
16:01In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Arvid Vermote, Chief Information Security Officer (CISO) at GlobalSign, to dive into the Certificate Authority/Browser Forum (CA/B Forum), the decision-making body behind the rules that keep the internet's trust backbone secu…
…
continue reading

1
From Locked Box to a Virtual Fort Knox
14:32
14:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
14:32Think of trust on a unimaginable scale. Think about it. How does a massive organization like a huge bank or even an entire city handle the job of digitally signing thousands or even millions of documents. It's a huge challenge and it's forcing a major rethink of how we prove who we are online. Examples such as a city government, a multinational cor…
…
continue reading

1
AI Permissions vs. Human Permissions: What Really Changes?
10:38
10:38
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:38We’ve been talking about identity and access for people for decades (millennia if you think outside tech). Policies, role assignments, reviews, zero trust — these are familiar tools. The assumptions that go into them, however, don't quite work when the "user" is no longer a person." Enter in the AI Agent.…
…
continue reading

1
Australia’s Deepfake Dilemma and the Danish Solution
5:54
5:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:54This is a really great article that I came across in 'The Strategist' Australia’s Deepfake Dilemma and the Danish Solution By Andrew Horton and Elizabeth Lawler Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of…
…
continue reading

1
Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure
12:22
12:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:22We don’t spend much time thinking about the roads we drive on—until one cracks, collapses, or dumps us somewhere we didn’t mean to be. Identity in the age of agentic AI? Same deal. It’s infrastructure. Like a good road, it needs to be ready for traffic we can’t imagine.על ידי Heather Flanagan
…
continue reading

1
Watch Out! There is a Regulation About.....
13:22
13:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:22The image of a deer caught in the headlights of an oncoming car comes to mind whenever I remember the eIDAS deadlines for verifiable credentials to be made available by the end of 2027 for all regulated bodies in the EU, the end of 2026 for public administrations.על ידי Jon Shamah
…
continue reading

1
Transforming Society using Digital Wallets
13:22
13:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:22This podcast outlines the transformative potential of Digital Wallets, detailing their functionality, benefits, and the different models emerging, particularly within the EU. Digital Wallets are presented as a secure, efficient, and private means for managing various credentials and facilitating complex transactions. The EU's proactive approach, co…
…
continue reading

1
Bot or Not? Why Incentives Matter More Than Identity
9:35
9:35
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:35Let’s start with a confession: I love bots. Or at least, I love the idea of them. They’re efficient, tireless, and, if designed well, can be downright helpful. (They can also be downright unhelpful, but that's a topic for a different blog post.) But the incentives around bot traffic are completely out of balance, and that makes things messy.…
…
continue reading

1
Digital Design of Public Services: Confronting the Accessibility Challenge
12:47
12:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:47Governments are increasingly turning to digital platforms to deliver smarter public services, driven by the promise of significant efficiency gains and time savings for citizens. Yet, this transformation presents a critical challenge: how to ensure that these services remain accessible to everyone, regardless of their digital capabilities or circum…
…
continue reading

1
Working Group Chair Skills: Standards Work Isn’t Just for Coders
13:35
13:35
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:35This one’s for everyone who’s ever said, "I’m not technical enough to participate in standards development."If you’ve wondered what working group chair skills actually matter, I have news for you: you don’t need to be a spec-writing wizard to be effective. I do get it, though.על ידי Heather Flanagan
…
continue reading

1
The Ten Commandments of Digital Identity Wallets
13:10
13:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:10There needs to be a comprehensive list of fundamental non-technical specifications to ensure a solid future Digital Wallet based society: 1) Function 2) Trust 3) Use 4) Automation 5) Confidentiality 6) Cost 7) Accessibility 8) Universality 9) Transferability 10) Resilienceעל ידי Jon Shamah
…
continue reading

1
Why 91% of Cyberattacks Start with Email and How to Protect Yourself with Stefan Cink
16:51
16:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
16:51In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Stefan Cink, Director of Business and Professional Services at NoSpamProxy, to break down the real vulnerabilities in email security and strategies to protect yourself.על ידי GMO GlobalSign Limited
…
continue reading

1
Agentic AI in the Open Standards Community: Standards Work or Just Hype?
12:37
12:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:37If you want to follow what's happening in AI, it helps to know where the conversations are happening. That doesn't just mean the headlines and white papers; it means the standards bodies, working groups, and protocol discussions shaping the infrastructure AI systems will have to live with (and live inside).…
…
continue reading

1
Cloud-Based Remote Secure Elements vs. Traditional Solutions for Document Issuers
10:05
10:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:05This podcast explores the evolution of digital signing solutions for organisations, contrasting traditional non-cloud methods with cloud-based Remote Secure Element (RSE) technology. While older systems, often relying on on-premises hardware, offer strong physical security, they typically present challenges in scalability and operational costs. Con…
…
continue reading
It is holiday-time and systems that rely on human-beings are under stress, with the deficiencies of those systems designed to supplement human-beings also being exposed. Two issues, alike to an extent but in different academic organisations, have occurred during this holiday season and these have revolved around passwords. With a lack of IT Support…
…
continue reading

1
Not Just a Technical Problem: Why Fighting Disinformation Needs Resilient Infrastructure
10:36
10:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:36Disinformation. Misinformation. Malinformation. These terms get used interchangeably, but they’re not the same thing. That distinction matters when designing resilient infrastructure that supports trust. Most of our efforts to address these problems focus on content, activities like fact-checking, moderation, and takedown requests.…
…
continue reading
I received ethical criticism from am unlikely source recently, and one very close to home. Actually, that criticism hit a very strong ethical point and it should be noted and also discussed further. There have been many discussions online regarding the thorny topic of AI and its ethical impact on society. Most have taken place around Agentic AI and…
…
continue reading

1
The need for QTSPs. It’s not an easy job!
16:19
16:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
16:19Verifiable credentials (VCs) are digital attestations designed for secure and decentralized identity management within the European Digital Identity Wallet (EUDI Wallet). They use cryptographic signatures, and decentralized identifiers (DIDs) for authentication, privacy, and interoperability. The EUDI Wallet integrates VCs for secure storage, prese…
…
continue reading

1
Trusting Videos in the Digital Age
12:55
12:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:55In today's interconnected world, the concept of trust has taken on new dimensions. With the advent of technology and the proliferation of online interactions, trusting people in the digital age has become both a necessity and a challenge. As we navigate this complex landscape, it is essential to understand the nuances of trust and the strategies th…
…
continue reading
The important thing is not to panic! There appears to be no real rush. The 2026 deadline is a year away, and all potential QTSPs are pushing off the decision do to take the plunge and invest in their future. However, this appearance of plenty of time is an illusion! Deadlines do have a real habit of rushing towards you. So maybe just a mild panic m…
…
continue reading
This is a common English phrase, used in other languages too, and means that whatever I say or consent to, can be trusted. So, what is the history and how relevant is it in today’s digital age? We must not confuse this phrase with identity verification ‘per se’. Whilst the two are closely related, the verification of an identity does not imply cons…
…
continue reading

1
Money, Money, Money, must be funny.......
9:27
9:27
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:27Money, Money, Money, must be funny....... I’ve begun to question whether this assertion remains entirely true. Traditionally, money has been divided into two distinct forms: •Anonymized money—banknotes, cash, micropayments, coins. •Larger identifiable sums, typically transferred via bank transactions, drafts, PSD2 mechanisms, etc. While considerabl…
…
continue reading

1
The Global Digital Conference in Geneva – Some Thoughts on Global Identity Ecosystem Resilience
9:30
9:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:30The Global Digital Conference in Geneva – Some Thoughts We have a vast dependence of Digital Signatures and resilience is everything. More and more processes are needing to become Qualified Trusted Service Providers, and implicit in that is becoming reliant on qualified digital signatures to sign attestations, documents, and almost every important …
…
continue reading

1
The Three Little Pigs of Cyber Security
6:47
6:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:47This is a tongue-in-cheek approach to thinking about cyber-security for SMEs, using the analogy of the three little pigs and their houses of straw, sticks, and bricks. Its a simple introduction for non-professionals.על ידי Jon Shamah
…
continue reading

1
The EU Business Wallet - Efficiency and Trust for Commerce
10:45
10:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:45The European Business Wallet In the Euro area alone, there were over 66 billion non-cash transactions last year, equating to approximately 21 transactions per capita annually. Additionally, the value of online B2B transactions exceeded 1.5 trillion euros, so it is no surprise that attention is now turning to the European Business Wallet.…
…
continue reading
The increasing convergence of new technologies is reshaping the digital landscape in ways that often go unnoticed. A key development within this transformation is Agentic Artificial Intelligence (AI)—systems designed to operate autonomously, make decisions, and achieve predefined objectives without constant human intervention. g tasks, making decis…
…
continue reading

1
Its Summer Time but its no time to rest dealing with important digital issues
11:52
11:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:52☀️ Summer might suggest relaxation, but it's a critical time for digital vigilance. With rising cyber threats and the push for secure digital identity solutions across Europe, strategizing and safeguarding infrastructures can't take a holiday. As competition and regulatory pressures grow, consistency and trust must be prioritized—even when the sun’…
…
continue reading

1
Too Small to Hack? Busting the Myth Putting Your Business at Risk with Sarah Armstrong-Smith
28:17
28:17
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:17In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Sarah Armstrong-Smith, Best Selling Author and Co-Host of the Cyber Sisters podcast, to dismantle the dangerous myth that SMEs are "too small to hack," how cloud-based tools can bolster resilience, and how the right mix of AI…
…
continue reading

1
Can Data Protection Be Cybersecurity's Greatest Ally? with Richard Hancock
17:34
17:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:34In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Richard Hancock, Data Protection Officer at GlobalSign, to discuss how data protection intersects with cybersecurity strategy and why strong encryption standards and identity verification are fundamental to preventing cyber-a…
…
continue reading

1
Why Shorter Certificate Lifespans are a Hidden Security Opportunity with Kevin Naidoo of Quantum PKI
22:02
22:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
22:02In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Kevin Naidoo, Founder and Engineering Lead at Quantum PKI, to explore the challenges of managing shorter certificate lifespans and the importance of automation when it comes to certificate lifecycle management (CLM).…
…
continue reading

1
Why Banning AI in Your Company Is a Huge Mistake with Richard Stiennon
25:46
25:46
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:46In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Richard Stiennon, Chief Research Analyst at IT-Harvest. Together, they explore the revolutionary impact of AI on cybersecurity operations. From practical applications in threat hunting to essential PKI management practices, Richard…
…
continue reading

1
Why Women in Tech Make Businesses More Secure with Jane Frankland and Lila Kee
29:11
29:11
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:11In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Jane Frankland, CEO of KnewStart, and Lila Kee, Chief Product Officer at GlobalSign. Together, they discuss the evolving role of women in cybersecurity, including why diversity matters, bridging the gender gap in tech, how AI…
…
continue reading

1
Why PKI Is the Last Unbreakable Pillar of Cybersecurity with Olivier Ruff of RNTrust Group
24:39
24:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
24:39In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Olivier Ruff, Cyber Security Lead and CTO at RNTrust Group, to dive into the evolving landscape of digital identity, the critical role of PKI in cybersecurity, why digital trust is the invisible shield protecting your busines…
…
continue reading

1
Are Your Digital Certificates Ready for Tomorrow? With Henrik Dürr of TRUSTZONE
23:26
23:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:26In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Henrik Dürr, CEO and Founder of TRUSTZONE, to explore the evolving landscape of digital certificates and PKI management. Henrik shares the challenges of shorter SSL certificate validity periods, the rise of automation protocols lik…
…
continue reading

1
Welcome to Trust.ID Talk: Your Critical Source for Navigating Digital Identity
0:53
0:53
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
0:53As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, heal…
…
continue reading

1
Exploring the Importance of Identity Governance with Craig Ramsay, Omada – Podcast Episode 102
25:27
25:27
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:27Let’s talk about digital identity with Craig Ramsay, Senior Solutions Architect at Omada. What is Identity Governance and Why is it important? Craig Ramsay, Senior Solutions Architect at Omada joins Oscar to explore all things Identity Governance including – the role of Identity Governance in compliance with regulations and standards, how it affect…
…
continue reading

1
The Right Time to Invest in Identity and Access Management (IAM) with Jesse Kurtto, Ubisecure
28:02
28:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:02Let’s talk about digital identity with Jesse Kurtto, DPO and Data Scientist at Ubisecure. Is now the right time to invest into Identity and Access Management (IAM)? Join us for episode 101, as Oscar is exploring why now is the right time to invest into IAM with Jesse Kurtto, DPO and Data Scientist at Ubisecure – as they delve into the current econo…
…
continue reading

1
Digital Identity Buzz: Passwordless, Identity Wallets & Digital Money with Heather Flanagan, Spherical Cow Consulting and David Birch, 15Mb
32:07
32:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:07Let’s talk about digital identity with Heather Flanagan, Principal at Spherical Cow Consulting and David Birch, Principal at 15 Mb, author, advisor and commentator on digital financial services. This is the 100th episode of Let’s Talk about Digital Identity – in this special episode two of our most popular guests, Heather Flanagan and David Birch, …
…
continue reading

1
The Missing Identity Layer of the Internet with Gautam Hazari, Sekura.id
33:19
33:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:19Let’s talk about digital identity with Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id. Join this episode of Let’s Talk About Digital Identity where Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id joins Oscar to discuss the miss…
…
continue reading

1
Generative AI in Identity Verification with Russ Cohn, IDVerse – Podcast Episode 98
26:29
26:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:29Let’s talk about digital identity with Russ Cohn, the (Go-To-Market) for IDVerse. In episode 98, Russ Cohn the Go-To-Marketing for IDVerse joins Oscar to explore Generative AI within Identity Verification – including what is generative AI and deepfakes, why deepfakes are a threat for consumers and businesses, and some of the biggest pain points in …
…
continue reading

1
The Role of Verifiable Credentials in Digital Identity with Riley Hughes, Trinsic – Podcast Episode 97
28:59
28:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:59Let’s talk about digital identity with Riley Hughes, Cofounder and CEO at Trinsic. This week, Oscar is joined by Riley Hughes, Cofounder and CEO at Trinsic and host of the Future of Identity podcast. They delve into Verifiable Credentials, including what verifiable credentials are, some examples and success stories of how these are being used and i…
…
continue reading