Attack path management: Why identity has become the primary security battleground
Jared Atkinson, CTO at SpecterOps For years, defenders have focused on stopping an initial breach. Firewalls, endpoint tools, and phishing controls all aimed to keep attackers out. But that model no longer reflects how most modern intrusions occur. In fact, getting...
From login to ledger: Identity’s new role in payment trust
By Christina Hulka, Executive Director, Secure Technology Alliance Identity leaders have spent the last few years redefining what “sign-in” really means. Authentication is no longer a front-door step that happens once, then fades into the background. It is...
Why a Fortune 50 automotive leader chose SGNL to accelerate zero trust
Guest article: SGNL A look into the decision-making process that led one of the world’s top automotive manufacturers to select SGNL to replace its legacy PAM solution and build a foundation for Continuous Identity. Overview Zero visibility into real-time...
The fiduciary commons: restoring ordered liberty in the age of data
Guest article by Mike Leahy In an era when personal facts fuel markets, governance, and machine learning, modern law faces a categorical error: it treats information as property. This paradigm, inherited from industrial capitalism, collapses under the weight of the...
The UK rail industry faces growing cyber threat as new legislation demands urgent action
Expert Insight from Petards Rail Britain's railways are emerging as a prime target for cyber criminals, with the convergence of ageing infrastructure and digital systems creating security vulnerabilities across the network. New government legislation threatens tougher...
Learning from BritCard: Why architecture matters for digital trust and identity
Guest author: Joni Brennan Features in Letters from the President by DIACC The choices we make about digital trust and identity verification architecture today will shape Canadian privacy, security, and digital rights for generations to come. Recent developments in...
Age verification is coming for the whole internet
Written by Jack Oliver Compliance & Regulations Writer The internet is about to change in a big way. For decades, it has been a space where anyone could browse, stream, shop, and socialize without ever proving who they were. But that era of complete anonymity is...
The UK’s new age verification laws are doing the right thing the wrong way
By Jarek Sygitowicz, Co-Founder and Chief Strategy Officer at Authologic It has been just a few weeks since new age verification rules were introduced in the UK as part of the Online Safety Act (OSA). The law was introduced ostensibly with the goal of keeping children...
From Complexity to Simplicity: How WundaNumba’s UDIS Transforms Digital Identity Access
The Digital Identity Adoption Crisis: How UDIS Unlocks Universal Access Breaking the barriers between technical capability and mass adoption through patent-protected innovation Despite billions invested in digital identity infrastructure globally, citizen and...
Rebuilding trust in the digital state: A framework for verifiable government rooted in fiduciary duties
Written by Michael Leahy, Vice President, National IT Strategy, Government Sourcing Solutions The rapid acceleration of digital transformation presents both unprecedented opportunities and profound challenges for governments worldwide. As states increasingly...
The Online Safety Act is here. Will parents finally sleep better?
Bridging the Gap Between Regulation and Real-World Parenting Guest post: Nino Dvalidze, Founder, Young Minds App Online safety tool for families As a mother, parenting influencer, and founder of a digital safety tool used by thousands of UK families, I’ve seen...
On ID Talk podcast, Lakota Software Solutions confirms meeting biometric-focused government officials and starting pilots from #IdentityWeekEurope 2025
Lakota Software Solutions, already powering FBI and DoD biometric systems with its Ani SDK, is expanding globally by solidifying its role in developing biometric enrollment and identification systems. Headquartered in Fairmont, West Virginia, Lakota Software Solutions...
Digital boarding is here, but brits aren’t ready to ditch the passport
The UK is rapidly advancing its shift toward digital identity in air travel, with a major rollout of facial recognition technology announced in March 2025 across 14 major airports, including Heathrow, Gatwick, Manchester, and others. The initiative introduces...
18 months to launch: Is Europe ready for the EU Digital ID Wallet?
Authored by Viky Manaila, co-authored by Chris Tullis Introduction All 27 European Union member states have a deadline of December 2026 to ensure that a European Digital Identity (EUDI) Wallet is available to their citizens. Meanwhile, European Economic Area (EAA)...
Cybersecurity expert urges customers to ‘keep a close eye’ after M&S reveals customer data stolen in cyber attack
Birmingham City University's Deputy Head of the College of Computing and Cybersecurity expert, Dr Junaid Arshad, explains how stolen personal information, including contact details and dates of birth, may increase the risk of serious threats in the future. After being...
Comprehensive guide to crypto wallet screening for secure transactions
Article contributed by seowala.com Total cryptocurrency adoption worldwide has caused safety alongside transaction legitimacy to emerge as paramount issues. Statista data shows that crypto user verification increased dramatically from 35 million in 2018 to exceed 300...
Simplifying identity and access management in a hybrid world
Article contributed by Eric Olden, CEO, Strata Identity For enterprise identity and access management (IAM) teams, mergers and acquisitions (M&A) present a familiar challenge: quickly providing new employees access to applications and data across multiple...
What you need to know: Transformative Women Inclusion Report 2025
We are delighted to announce our report, 'Transformative Women: Women's inclusion in the evolving identity industry', in connection with our Transformative Women initiative at Identity Week Europe and Identity Week America. Inclusion in any workplace is a basic right....
Technology companies leak most user information, dark web reveals
Vakaris Noreika, a cybersecurity expert at NordStellar Data from 2024 shows that 278M leaked email addresses and phone numbers on the dark web come from companies operating in the tech industry As many as 716M user contacts — namely 554M email addresses and...
ID Talk: HID’s Rob Sutton on how identity technology is transforming air travel
This week, the ID Talk podcast welcomed Rob Sutton, HID’s Director of Solution Enablement for Aviation and Travel, who shed new light on the challenges and opportunities facing the air travel sector with respect to digital transformation. With a career spanning nearly...














