EU Digital Identity Wallet: A Catalyst for Business Transformation
On February 29, 2024, the European Union (EU) Parliament voted in favor of amendments to the eIDAS regulation, marking a significant milestone on the road to a unified standard for European digital identity services.
A Closer Look at eIDAS 2.0 and the EU Digital Identity Wallet
The European landscape is witnessing significant developments in the field of digital identity, especially with the progress of eIDAS 2.0 and the EU Digital Identity Wallet (EUDI Wallet). However, their intricacies are often muddled, resulting in misconceptions and uncertainties surrounding their diverse roles and applications.
AI Regulation: Challenges and Opportunities
The US and EU share the common goal of ensuring safe and democratic AI, fostering the potential for aligned transatlantic regulatory approaches. The EU-US Trade and Technology Council demonstrates early success in collaborating on trustworthy AI metrics and methodologies, emphasizing the need for further alignment and knowledge sharing.
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare and ensuring accountability. Engaging discussions on this dynamic intersection create a space for diverse voices and foster fruitful collaborations among stakeholders.
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the state is characterized by notions of territory as fixed boundaries, under the power and rule of specific states, and protected by international laws which legitimize the state as territorially fixed. Thus, sovereignty and the international legal personality of states are inextricably linked.
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state entities, have taken advantage of its vast interconnectedness to partake in a wide range of activities, including malicious behavior.
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
Going Passwordless – Separating Identity and Authentication
Before starting any passwordless authentication journey, understanding the difference between identity and authentication is an important step. Alejandro Leal takes you on an exploration of the meaning of identity and authentication in the digital world, and how it applies to passwordless authentica
Human Factor in Cybersecurity: The Weakest Link?
Will Users and Organizations Have Trust in Keys Roaming via the Cloud?
As long as passwords continue to be used, users and organizations will remain vulnerable to attacks. Replacing passwords as the dominant form of authentication on the Internet now seems to be possible. Read now and learn more.
Public-Private Cooperation in Cyberspace