by Gary Rowe | Sep 25, 2017 | Cybersecurity, Gary Rowe, Identity
Most breaches start with compromised identity and compromising identity is much easier with free-flowing Personally Identifiable Information (PII). So, could breaches supported by access to sensitive PII be reduced by foundational shift from monolithic database...
by Gary Rowe | Jul 18, 2017 | Gary Rowe, Identity
Successful digital transformation requires a robust, adaptive, scalable and secure means of collecting, managing, authenticating, provisioning and leveraging digital identities in support of a wide range of applications and use cases. The right Identity and Access...
by Gary Rowe | Apr 9, 2017 | Blockchain, Gary Rowe, Identity
Internet identity management has struggled to replicate existing real (physical) world systems. For example, crossing a country border generally requires a physical passport, and buying alcohol (in the US at least) requires the presentation of a driver’s license. This...
by Gary Rowe | Dec 27, 2016 | Gary Rowe, Identity
Most organizations are collecting increasing volumes of information about external stakeholders including consumers, prospects, customers and partners. The challenge most face is that the identities associated with this information are often stored in silos with...
by Gary Rowe | Nov 14, 2016 | Gary Rowe, Identity
Putting identity into context or contextualizing and establishing relationships between identity data sets is, when seen holistically, a major step on the path to a significant digital transformation for the enterprise. The bottom line is identity data is of far...
by Gary Rowe | Oct 23, 2016 | Blockchain, Gary Rowe, Identity
Identity Management is at the core of the secure IT infrastructure that every company, government agency and institute of higher education strives to achieve. The establishment of identities and distribution of those identities will be leveraged by virtually every...
Recent Comments