Facebook, Instagram to offer paid 'blue tick' verification starting in Australia and New Zealand this week, following similar move by…
The ION network would use Bitcoin's blockchain for identity assurance, while creating a secondary network to vastly speed up processing…
Critics say plans to link together existing identity databases across the EU may break Europe's own data protection laws
The two companies demonstrated a prototype that could help provide officially recognised identification for 7 million refugees worldwide
Companies will be able to use the network to securely validate services and identities
The scheme has taken longer than expected to get up to speed as 'no-one's built anything like Gov.uk Verify before'
Royal Mail identity service that connects to GOV.UK Verify has gone live
Daniel Raskin, VP of strategy at ForgeRock, thinks companies must change their approach to customer identity and privacy to achieve…
Matthew Maxwell, associate creative director at marketing firm SapientNitro, discusses the art of identity technology
Ryan Barrett, VP of privacy and security, Intermedia, shares top security tips that even James Bond could do with
Richard Parris built Meccano models. Now he makes identity and credential management systems
Yahoo is to insist that users login via a dedicated a Yahoo ID, and not by using Google or Facebook…
The Target breach exposed how weak security is at shops. Wayne Rash wants to see biometrics
RSA pushing ahead with its intelligence-led approach to security
Microsoft and its PhoneFactor unit have been hit with a patent-infringement lawsuit from a little-known company
Despite an endless series of breaches, the problems with passwords are really very basic, says Fahmida Y Rashid
Identity fraud experienced a sharp drop in 2010 after a two year rise, according to new research
The EU-backed ABC4Trust scheme stops users over-sharing on websites
The Obama administration has outlined plans for a private sector-led identity system intended to reduce fraud
Cybercrime is more prevalent than previously thought... and users are not happy
Security is to remain one of the fastest-growing areas within the enterprise software market, driven by factors such as compliance…
The cloud needs safe information sharing, not old-fashioned identity management - and that's where the OAuth protocol comes in
P2P Cyber Protection and Informed User Act would prohibit peer-to-peer file sharing programs from being installed without the informed consent…