Competition is tough in the retail industry, including online where Small and Medium Enterprises (SME) effectively compete with large retail corporations. Customer Identity and Access Management (CIAM) can make a business competitive difference. Continue reading “Online Retail: more reasons to a better CIAM”
What would you do about private digital communication services if you were a leading political figure? How would you balance the priorities of privacy to best foster the development of your nation’s digital economy (relying on citizens and businesses digital trust) and the importance of counter-terrorism activities through digital surveillance? Continue reading “Counter-terrorism digital surveillance vs privacy from a politician point of view”
What would you want in exchange for foregoing your privacy and being monitored online: your every online move, all the sites and the apps you go to and for how long? Continue reading “Join a digital big brother program?”
I recently had the privilege of hosting a series of think tank sessions in Melbourne and in Sydney for the occasion of the FST Future of Security events in March, which Pirean was a sponsor of. The subject of the discussion was Consumer Digital Identity Management. The think tank aimed at addressing the boosting of online services adoption with efficient and attractive consumer identity management practices. The following questions provided a starting point to the group discussions:
IAM Feeling Good?
I switched banks years ago. My former bank’s financial services and benefits were average when compared to other banks, but something in particular triggered my decision to switch. I had developed a bad online user experience, and especially a bad feeling about Identity and Access Management (IAM). Continue reading “The feeling of digital identity management”
This is a sad day for technology. I love it when technology enables progress and efficiency in business and society. It saddens me when progress is stopped over security fears. I can certainly appreciate the risk management logic with e-voting, especially in times of suspected elections influence through hacking. However, I wonder whether the below case is more a question of a poor risk management practice causing a setback to progress. Continue reading “A vote of no-confidence in e-voting”