Media Coverage

EIC 2022: Michiel van der Veen discusses public service transformation using digital ID

Dr. Michiel van der Veen, of the Netherlands’ Ministry of the Interior and Kingdom Relations, gave a presentation at the European Identity and Cloud Conference ( EIC ) 2022 on the critical technologies and concepts used in the development of digital ID today, including decentralization, zero trust, privacy by design, artificial intelligence (AI), and how these technologies can be fully harnessed to make public services more agile. And how a change in culture can be necessary to give large-scale projects a fighting chance. The public sector executive explained how the...

Read More

Orchestrate digital ID to simplify KYC process: Jumio

A streamlined know your customer (KYC) journey and digital ID orchestration through a single API will become the future of the anti-fraud market that will demand an ever smoother user experience and security, and polarize the sector into “orchestrators” and the “orchestrated,” according to a speaker from  Jumio  at the  European Identity and Cloud Conference  (EIC 2022). Ingo Ernst, the general manager of Jumio’s platform division, gave a presentation titled ‘Why KYC Isn’t Enough,’ where he emphasized the “need...

Read More

Decentralized digital identity takes the stage at European Kuppinger Cole event

A generalized IT trend towards decentralization is finding expression in digital identity, speakers explained during the  European Identity and Cloud  (EIC) Conference 2022. The conditions are right for change, but come with their own set of challenges. The digital transformation that has accelerated with recent world events has led to new patterns and increases in risk for businesses, and swung the pendulum of IT ecosystems back towards decentralization, according to  Kuppinger Cole  Principal Analyst Martin Kuppinger. Growth in disruptive times like the...

Read More

Good management of privileged credentials can stop or slow an attacker's movement through your network. These PAM tools are among the best.

One of the main objectives of the bad guys is to escalate to privileged account access wherever possible. The more unfettered access they can gain to administrative, superuser and infrastructure accounts, the freer rein they have to tap into sensitive data stores, tamper with critical systems, quietly gain carte blanche to do whatever they’d care to with a victim organization’s IT infrastructure and to do it all without being detected. As a result, organizations recognize that they need to take special care with the way that they manage and grant access to the most...

Read More

Kim Cameron remembered via his 7 Laws for Identity

Friends of the late computer scientist Kim Cameron took the opportunity of gathering at the KuppingCole European Identity & Cloud Conference ( EIC 2022 ), to remember Cameron, his life and contribution to digital identity and beyond via his 7 Laws of Identity. Published in  2005 , the laws have proved highly influential for companies, networks and individuals in tackling what Cameron saw as the fundamental issue for online identity: “The Internet was not built with an Identity layer.” Seven of his friends and former colleagues and peers remembered Cameron...

Read More