If you work in e-commerce and cyber security policy, law, regulations or strategy, you’ve almost...
PKI has a reputation for terrible complexity, but it is actually simpler than many mature...
What do you call it when a metaphor or analogy outgrows the word it is...
What most people seem to be missing in the NSTIC discussion is the sheer novelty...
Why should digital identity be so tricky? The past decade is littered with earnest initiatives...
Interoperability slides off the tongue as a must-have in identity systems but is it really self-evidently...
How are we to read Peter Steiner’s famous cartoon “On the Internet, nobody knows you’re...
Apple is reported to have acquired the “Polar Rose” technology that allows photos to be tagged...
One of the many open questions in the proposed National Strategy for Trusted Identities in...
Predictably, ratification by the President of the US National Strategy for Trusted Identities in Cyberspace has...