Remove tag physical-identity-access-management
article thumbnail

Zero Trust with Zero Data

Phil Windley

Summary: The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online. If we assume breach, then the only strategy that can protect the corporate network, infrastructure, applications, and people is to authorize every access.

Data 66
article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. password, fingerprint, OTP) before granting access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Case for Decentralized Identity

Phil Windley

Summary: We cannot decentralize many interesting systems without also decentralizing the identity systems upon which they rely. We're finally in a position to create truly decentralized systems for digital identity. Most interesting systems have an identity component. The problem with decentralized identity is even more acute.

System 92
article thumbnail

Zero Data

Phil Windley

My new book, Learning Digital Identity , talks about the concept. Anonymous Credential Proofs: VCs can be designed to be presented anonymously, allowing users to prove a claim about themselves without revealing their identity. I've been thinking a lot about zero trust lately, so the name leapt out at me.

Data 65
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

Perhaps you've heard about Silk Road, the online drug Emporium it was located on the dark web, meaning you had to use a special browser, the onion router or Tor to access it. The administrator for the site would always be Dread Pirate Roberts, but different people could assume that identity over time. Not so easy.

Mobile 52
article thumbnail

Meet the latest Techstars Seattle cohort: 10 startups on how they’ve adapted to the pandemic

GeekWire

Techstars Seattle Managing Director Isaac Kato. This is Isaac Kato’s second year leading the accelerator as Techstars Seattle managing director. Edify is an AI platform that allows engineering managers to instantly build and deploy technical onboarding programs to grow their teams. Techstars Photo).

Meeting 137
article thumbnail

Relationships and Identity

Phil Windley

Summary: We build digital identity systems to create and manage relationships—not identities. Identity systems should provide relationship integrity and utility to participants for the appropriate length of time. SSI provides improved support for creating, managing, and using digital relationships.