Digital Identity ציבורי
[search 0]
עוד
Download the App!
show episodes
 
Artwork

1
A Digital Identity Digest

Heather Flanagan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
שבועי
 
Welcome to A Digital Identity Digest, brought to you by Heather Flanagan of Spherical Cow Consulting. Here, we explore the evolving world of digital identity on the web. This podcast is spearheaded by Heather's expertise, where she breaks down complex concepts, shares the latest trends, and provides insightful analyses in online identity management. Join Heather as she navigates this dynamic digital pasture, delivering content that's both informative and engaging for tech enthusiasts, digita ...
  continue reading
 
This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation. While much of the analysis is rooted in developments across Europe, the series adopts ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
  continue reading
 
Your data is concentrated in the hands of a few large institutions. They are storing information about your browsing history, shopping habits, location, bank statements, medical history, and more. With the rising threat of data breaches, security threats, and loss of privacy - your information is increasingly at risk because you do not own your identity. We believe there is a better way. You, the identity owner - should own and control your own information. Welcome to the future of self-sove ...
  continue reading
 
Loading …
show series
 
A high-level workshop hosted in Ottawa, Canada, on October 6, 2025 took place, focusing on advancing digital collaboration, specifically regarding digital credentials and trust services, between the European Union (EU) and Canada. This event, which included policymakers and digital leaders, marked a significant step under the EU-Canada Digital Part…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
  continue reading
 
The integration of Artificial Intelligence into dispute resolution systems marks a pivotal shift in how justice is accessed and delivered. With the rise of On-Line Digital Resolution (ODR) platforms, AI technologies are increasingly used to facilitate intake, guide users, and predict outcomes. These innovations promise to streamline processes and r…
  continue reading
 
When not distracted by AI (which, you have to admit, is very distracting) I’ve been thinking a lot about delegation in digital identity. We have the tools that allow administrators or individuals grant specific permissions to applications and service. In theory, it’s a clean model.על ידי Heather Flanagan
  continue reading
 
The issue of sovereignty is raising its head across the globe, but more so in the Western Hemisphere. As nations show a growing distrust of others, there is a realisation that their respective national interests must be resilient to outside threats and geopolitics. This extends to national and national-critical data and the processing of that data.…
  continue reading
 
With the right motivation, even I will write a blog post on a dare. And the dare I got was to write a post about what librarians and pirate captains have in common, and why it matters for standards development. (If you can’t have fun when writing, what’s the point?)על ידי Heather Flanagan
  continue reading
 
A critical dimension of this evolving Wallet landscape is the emergence of agentic workflows—processes driven by autonomous or semi-autonomous agents. These workflows can be broadly categorized into closed and open models, each presenting distinct challenges and implications for responsibility and liability.…
  continue reading
 
Google recently gave us something we’ve been waiting on for years: hard numbers on how much energy an AI prompt uses. According to their report, the median Gemini prompt consumes just 0.24 watt-hours of electricity — roughly running a microwave for a second — along with some drops of water for cooling.…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Arvid Vermote, Chief Information Security Officer (CISO) at GlobalSign, to dive into the Certificate Authority/Browser Forum (CA/B Forum), the decision-making body behind the rules that keep the internet's trust backbone secu…
  continue reading
 
Think of trust on a unimaginable scale. Think about it. How does a massive organization like a huge bank or even an entire city handle the job of digitally signing thousands or even millions of documents. It's a huge challenge and it's forcing a major rethink of how we prove who we are online. Examples such as a city government, a multinational cor…
  continue reading
 
We’ve been talking about identity and access for people for decades (millennia if you think outside tech). Policies, role assignments, reviews, zero trust — these are familiar tools. The assumptions that go into them, however, don't quite work when the "user" is no longer a person." Enter in the AI Agent.…
  continue reading
 
This is a really great article that I came across in 'The Strategist' Australia’s Deepfake Dilemma and the Danish Solution By Andrew Horton and Elizabeth Lawler Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of…
  continue reading
 
We don’t spend much time thinking about the roads we drive on—until one cracks, collapses, or dumps us somewhere we didn’t mean to be. Identity in the age of agentic AI? Same deal. It’s infrastructure. Like a good road, it needs to be ready for traffic we can’t imagine.על ידי Heather Flanagan
  continue reading
 
The image of a deer caught in the headlights of an oncoming car comes to mind whenever I remember the eIDAS deadlines for verifiable credentials to be made available by the end of 2027 for all regulated bodies in the EU, the end of 2026 for public administrations.על ידי Jon Shamah
  continue reading
 
This podcast outlines the transformative potential of Digital Wallets, detailing their functionality, benefits, and the different models emerging, particularly within the EU. Digital Wallets are presented as a secure, efficient, and private means for managing various credentials and facilitating complex transactions. The EU's proactive approach, co…
  continue reading
 
Let’s start with a confession: I love bots. Or at least, I love the idea of them. They’re efficient, tireless, and, if designed well, can be downright helpful. (They can also be downright unhelpful, but that's a topic for a different blog post.) But the incentives around bot traffic are completely out of balance, and that makes things messy.…
  continue reading
 
Governments are increasingly turning to digital platforms to deliver smarter public services, driven by the promise of significant efficiency gains and time savings for citizens. Yet, this transformation presents a critical challenge: how to ensure that these services remain accessible to everyone, regardless of their digital capabilities or circum…
  continue reading
 
This one’s for everyone who’s ever said, "I’m not technical enough to participate in standards development."If you’ve wondered what working group chair skills actually matter, I have news for you: you don’t need to be a spec-writing wizard to be effective. I do get it, though.על ידי Heather Flanagan
  continue reading
 
There needs to be a comprehensive list of fundamental non-technical specifications to ensure a solid future Digital Wallet based society: 1) Function 2) Trust 3) Use 4) Automation 5) Confidentiality 6) Cost 7) Accessibility 8) Universality 9) Transferability 10) Resilienceעל ידי Jon Shamah
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Stefan Cink, Director of Business and Professional Services at NoSpamProxy, to break down the real vulnerabilities in email security and strategies to protect yourself.על ידי GMO GlobalSign Limited
  continue reading
 
If you want to follow what's happening in AI, it helps to know where the conversations are happening. That doesn't just mean the headlines and white papers; it means the standards bodies, working groups, and protocol discussions shaping the infrastructure AI systems will have to live with (and live inside).…
  continue reading
 
This podcast explores the evolution of digital signing solutions for organisations, contrasting traditional non-cloud methods with cloud-based Remote Secure Element (RSE) technology. While older systems, often relying on on-premises hardware, offer strong physical security, they typically present challenges in scalability and operational costs. Con…
  continue reading
 
It is holiday-time and systems that rely on human-beings are under stress, with the deficiencies of those systems designed to supplement human-beings also being exposed. Two issues, alike to an extent but in different academic organisations, have occurred during this holiday season and these have revolved around passwords. With a lack of IT Support…
  continue reading
 
Disinformation. Misinformation. Malinformation. These terms get used interchangeably, but they’re not the same thing. That distinction matters when designing resilient infrastructure that supports trust. Most of our efforts to address these problems focus on content, activities like fact-checking, moderation, and takedown requests.…
  continue reading
 
I received ethical criticism from am unlikely source recently, and one very close to home. Actually, that criticism hit a very strong ethical point and it should be noted and also discussed further. There have been many discussions online regarding the thorny topic of AI and its ethical impact on society. Most have taken place around Agentic AI and…
  continue reading
 
Verifiable credentials (VCs) are digital attestations designed for secure and decentralized identity management within the European Digital Identity Wallet (EUDI Wallet). They use cryptographic signatures, and decentralized identifiers (DIDs) for authentication, privacy, and interoperability. The EUDI Wallet integrates VCs for secure storage, prese…
  continue reading
 
In today's interconnected world, the concept of trust has taken on new dimensions. With the advent of technology and the proliferation of online interactions, trusting people in the digital age has become both a necessity and a challenge. As we navigate this complex landscape, it is essential to understand the nuances of trust and the strategies th…
  continue reading
 
The important thing is not to panic! There appears to be no real rush. The 2026 deadline is a year away, and all potential QTSPs are pushing off the decision do to take the plunge and invest in their future. However, this appearance of plenty of time is an illusion! Deadlines do have a real habit of rushing towards you. So maybe just a mild panic m…
  continue reading
 
This is a common English phrase, used in other languages too, and means that whatever I say or consent to, can be trusted. So, what is the history and how relevant is it in today’s digital age? We must not confuse this phrase with identity verification ‘per se’. Whilst the two are closely related, the verification of an identity does not imply cons…
  continue reading
 
Money, Money, Money, must be funny....... I’ve begun to question whether this assertion remains entirely true. Traditionally, money has been divided into two distinct forms: •Anonymized money—banknotes, cash, micropayments, coins. •Larger identifiable sums, typically transferred via bank transactions, drafts, PSD2 mechanisms, etc. While considerabl…
  continue reading
 
The Global Digital Conference in Geneva – Some Thoughts We have a vast dependence of Digital Signatures and resilience is everything. More and more processes are needing to become Qualified Trusted Service Providers, and implicit in that is becoming reliant on qualified digital signatures to sign attestations, documents, and almost every important …
  continue reading
 
The European Business Wallet In the Euro area alone, there were over 66 billion non-cash transactions last year, equating to approximately 21 transactions per capita annually. Additionally, the value of online B2B transactions exceeded 1.5 trillion euros, so it is no surprise that attention is now turning to the European Business Wallet.…
  continue reading
 
The increasing convergence of new technologies is reshaping the digital landscape in ways that often go unnoticed. A key development within this transformation is Agentic Artificial Intelligence (AI)—systems designed to operate autonomously, make decisions, and achieve predefined objectives without constant human intervention. g tasks, making decis…
  continue reading
 
☀️ Summer might suggest relaxation, but it's a critical time for digital vigilance. With rising cyber threats and the push for secure digital identity solutions across Europe, strategizing and safeguarding infrastructures can't take a holiday. As competition and regulatory pressures grow, consistency and trust must be prioritized—even when the sun’…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Sarah Armstrong-Smith, Best Selling Author and Co-Host of the Cyber Sisters podcast, to dismantle the dangerous myth that SMEs are "too small to hack," how cloud-based tools can bolster resilience, and how the right mix of AI…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Richard Hancock, Data Protection Officer at GlobalSign, to discuss how data protection intersects with cybersecurity strategy and why strong encryption standards and identity verification are fundamental to preventing cyber-a…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Kevin Naidoo, Founder and Engineering Lead at Quantum PKI, to explore the challenges of managing shorter certificate lifespans and the importance of automation when it comes to certificate lifecycle management (CLM).…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Richard Stiennon, Chief Research Analyst at IT-Harvest. Together, they explore the revolutionary impact of AI on cybersecurity operations. From practical applications in threat hunting to essential PKI management practices, Richard…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Jane Frankland, CEO of KnewStart, and Lila Kee, Chief Product Officer at GlobalSign. Together, they discuss the evolving role of women in cybersecurity, including why diversity matters, bridging the gender gap in tech, how AI…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Olivier Ruff, Cyber Security Lead and CTO at RNTrust Group, to dive into the evolving landscape of digital identity, the critical role of PKI in cybersecurity, why digital trust is the invisible shield protecting your busines…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Henrik Dürr, CEO and Founder of TRUSTZONE, to explore the evolving landscape of digital certificates and PKI management. Henrik shares the challenges of shorter SSL certificate validity periods, the rise of automation protocols lik…
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, heal…
  continue reading
 
Let’s talk about digital identity with Craig Ramsay, Senior Solutions Architect at Omada. What is Identity Governance and Why is it important? Craig Ramsay, Senior Solutions Architect at Omada joins Oscar to explore all things Identity Governance including – the role of Identity Governance in compliance with regulations and standards, how it affect…
  continue reading
 
Let’s talk about digital identity with Jesse Kurtto, DPO and Data Scientist at Ubisecure. Is now the right time to invest into Identity and Access Management (IAM)? Join us for episode 101, as Oscar is exploring why now is the right time to invest into IAM with Jesse Kurtto, DPO and Data Scientist at Ubisecure – as they delve into the current econo…
  continue reading
 
Let’s talk about digital identity with Heather Flanagan, Principal at Spherical Cow Consulting and David Birch, Principal at 15 Mb, author, advisor and commentator on digital financial services. This is the 100th episode of Let’s Talk about Digital Identity – in this special episode two of our most popular guests, Heather Flanagan and David Birch, …
  continue reading
 
Let’s talk about digital identity with Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id. Join this episode of Let’s Talk About Digital Identity where Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id joins Oscar to discuss the miss…
  continue reading
 
Let’s talk about digital identity with Russ Cohn, the (Go-To-Market) for IDVerse. In episode 98, Russ Cohn the Go-To-Marketing for IDVerse joins Oscar to explore Generative AI within Identity Verification – including what is generative AI and deepfakes, why deepfakes are a threat for consumers and businesses, and some of the biggest pain points in …
  continue reading
 
Let’s talk about digital identity with Riley Hughes, Cofounder and CEO at Trinsic. This week, Oscar is joined by Riley Hughes, Cofounder and CEO at Trinsic and host of the Future of Identity podcast. They delve into Verifiable Credentials, including what verifiable credentials are, some examples and success stories of how these are being used and i…
  continue reading
 
Loading …

מדריך עזר מהיר

האזן לתוכנית הזו בזמן שאתה חוקר
הפעלה