What is identity and why is it important?
Posted on 01 July 2023 by
This blog explains what an identity is, and how governments and organisations can ensure that everyone gets access to the identity for which they have a legal right to have.
Posted on 01 July 2023 by
This blog explains what an identity is, and how governments and organisations can ensure that everyone gets access to the identity for which they have a legal right to have.
Posted on 23 May 2023 by
Highlights taken from Modernising Digital-ID Systems: What Open Standards and Open-Source Software Really Mean, for the Tony Blair Institute for Global Change. As organisations and Governments look to build inclusive Digital ID ecosystems, how do they overcome the key challenge of choosing which technology solution(s) to adopt? We recently collaborated on an article with the […]
Posted on 28 March 2023 by
Have you ever been asked to take a selfie when signing up to a new bank? This is known as identity verification. From opening a new bank account, to applying for a new driver’s license, it’s becoming a common way of authenticating someone when they sign up to a new service. So how does it work? […]
Posted on 31 January 2023 by
A lot can happen in the space of a single year. As technology evolves to open up new innovations and possibilities for businesses, they also give way to new challenges and considerations. So, what are some of the biggest challenges, and opportunities, businesses face in the year ahead of us? We spoke to some of […]
Posted on 27 January 2023 by
If you’ve worked in the technology industry for any amount of time, then you’ve heard the phrase ‘data is the new oil’. Like oil, raw data in itself isn’t valuable – but put to use, it can become extremely powerful. Businesses are using the power of data to transform and innovate and it’s hard to […]
Posted on 23 January 2023 by
In an age of increasing sophistication of cyber attacks, governments and partner organisations often find themselves as a target. These attacks often focus on identity, which can cause damage in the form of unencrypted data. Should hackers be successful in their attempts, it is possible they could allow fraudsters to manipulate electronic data in secure […]