Welcome to A Digital Identity Digest, brought to you by Heather Flanagan of Spherical Cow Consulting. Here, we explore the evolving world of digital identity on the web. This podcast is spearheaded by Heather's expertise, where she breaks down complex concepts, shares the latest trends, and provides insightful analyses in online identity management. Join Heather as she navigates this dynamic digital pasture, delivering content that's both informative and engaging for tech enthusiasts, digita ...
…
continue reading
This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation. While much of the analysis is rooted in developments across Europe, the series adopts ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
…
continue reading

1
The Digital Identity Podcast by SelfKey | Blockchain | Digital Identity | Decentralization |
SelfKey
Your data is concentrated in the hands of a few large institutions. They are storing information about your browsing history, shopping habits, location, bank statements, medical history, and more. With the rising threat of data breaches, security threats, and loss of privacy - your information is increasingly at risk because you do not own your identity. We believe there is a better way. You, the identity owner - should own and control your own information. Welcome to the future of self-sove ...
…
continue reading

1
Agentic Risk Mitigation in the Era of the EU Digital Identity Wallet
13:07
13:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:07A critical dimension of this evolving Wallet landscape is the emergence of agentic workflows—processes driven by autonomous or semi-autonomous agents. These workflows can be broadly categorized into closed and open models, each presenting distinct challenges and implications for responsibility and liability.…
…
continue reading

1
Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill
11:21
11:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:21Google recently gave us something we’ve been waiting on for years: hard numbers on how much energy an AI prompt uses. According to their report, the median Gemini prompt consumes just 0.24 watt-hours of electricity — roughly running a microwave for a second — along with some drops of water for cooling.…
…
continue reading

1
Who Decides the Internet’s Trust Rules? Inside the CA/B Forum with Arvid Vermote
16:01
16:01
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:01In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Arvid Vermote, Chief Information Security Officer (CISO) at GlobalSign, to dive into the Certificate Authority/Browser Forum (CA/B Forum), the decision-making body behind the rules that keep the internet's trust backbone secu…
…
continue reading

1
From Locked Box to a Virtual Fort Knox
14:32
14:32
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
14:32Think of trust on a unimaginable scale. Think about it. How does a massive organization like a huge bank or even an entire city handle the job of digitally signing thousands or even millions of documents. It's a huge challenge and it's forcing a major rethink of how we prove who we are online. Examples such as a city government, a multinational cor…
…
continue reading

1
AI Permissions vs. Human Permissions: What Really Changes?
10:38
10:38
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
10:38We’ve been talking about identity and access for people for decades (millennia if you think outside tech). Policies, role assignments, reviews, zero trust — these are familiar tools. The assumptions that go into them, however, don't quite work when the "user" is no longer a person." Enter in the AI Agent.…
…
continue reading
This is a really great article that I came across in 'The Strategist' Australia’s Deepfake Dilemma and the Danish Solution By Andrew Horton and Elizabeth Lawler Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of…
…
continue reading

1
Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure
12:22
12:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
12:22We don’t spend much time thinking about the roads we drive on—until one cracks, collapses, or dumps us somewhere we didn’t mean to be. Identity in the age of agentic AI? Same deal. It’s infrastructure. Like a good road, it needs to be ready for traffic we can’t imagine.Heather Flanagan által
…
continue reading

1
Watch Out! There is a Regulation About.....
13:22
13:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:22The image of a deer caught in the headlights of an oncoming car comes to mind whenever I remember the eIDAS deadlines for verifiable credentials to be made available by the end of 2027 for all regulated bodies in the EU, the end of 2026 for public administrations.Jon Shamah által
…
continue reading

1
Transforming Society using Digital Wallets
13:22
13:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:22This podcast outlines the transformative potential of Digital Wallets, detailing their functionality, benefits, and the different models emerging, particularly within the EU. Digital Wallets are presented as a secure, efficient, and private means for managing various credentials and facilitating complex transactions. The EU's proactive approach, co…
…
continue reading
Let’s start with a confession: I love bots. Or at least, I love the idea of them. They’re efficient, tireless, and, if designed well, can be downright helpful. (They can also be downright unhelpful, but that's a topic for a different blog post.) But the incentives around bot traffic are completely out of balance, and that makes things messy.…
…
continue reading

1
Digital Design of Public Services: Confronting the Accessibility Challenge
12:47
12:47
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
12:47Governments are increasingly turning to digital platforms to deliver smarter public services, driven by the promise of significant efficiency gains and time savings for citizens. Yet, this transformation presents a critical challenge: how to ensure that these services remain accessible to everyone, regardless of their digital capabilities or circum…
…
continue reading

1
Working Group Chair Skills: Standards Work Isn’t Just for Coders
13:35
13:35
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:35This one’s for everyone who’s ever said, "I’m not technical enough to participate in standards development."If you’ve wondered what working group chair skills actually matter, I have news for you: you don’t need to be a spec-writing wizard to be effective. I do get it, though.Heather Flanagan által
…
continue reading

1
The Ten Commandments of Digital Identity Wallets
13:10
13:10
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:10There needs to be a comprehensive list of fundamental non-technical specifications to ensure a solid future Digital Wallet based society: 1) Function 2) Trust 3) Use 4) Automation 5) Confidentiality 6) Cost 7) Accessibility 8) Universality 9) Transferability 10) ResilienceJon Shamah által
…
continue reading

1
Why 91% of Cyberattacks Start with Email and How to Protect Yourself with Stefan Cink
16:51
16:51
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:51In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Stefan Cink, Director of Business and Professional Services at NoSpamProxy, to break down the real vulnerabilities in email security and strategies to protect yourself.GMO GlobalSign Limited által
…
continue reading

1
Agentic AI in the Open Standards Community: Standards Work or Just Hype?
12:37
12:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
12:37If you want to follow what's happening in AI, it helps to know where the conversations are happening. That doesn't just mean the headlines and white papers; it means the standards bodies, working groups, and protocol discussions shaping the infrastructure AI systems will have to live with (and live inside).…
…
continue reading

1
Cloud-Based Remote Secure Elements vs. Traditional Solutions for Document Issuers
10:05
10:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
10:05This podcast explores the evolution of digital signing solutions for organisations, contrasting traditional non-cloud methods with cloud-based Remote Secure Element (RSE) technology. While older systems, often relying on on-premises hardware, offer strong physical security, they typically present challenges in scalability and operational costs. Con…
…
continue reading
It is holiday-time and systems that rely on human-beings are under stress, with the deficiencies of those systems designed to supplement human-beings also being exposed. Two issues, alike to an extent but in different academic organisations, have occurred during this holiday season and these have revolved around passwords. With a lack of IT Support…
…
continue reading

1
Not Just a Technical Problem: Why Fighting Disinformation Needs Resilient Infrastructure
10:36
10:36
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
10:36Disinformation. Misinformation. Malinformation. These terms get used interchangeably, but they’re not the same thing. That distinction matters when designing resilient infrastructure that supports trust. Most of our efforts to address these problems focus on content, activities like fact-checking, moderation, and takedown requests.…
…
continue reading
I received ethical criticism from am unlikely source recently, and one very close to home. Actually, that criticism hit a very strong ethical point and it should be noted and also discussed further. There have been many discussions online regarding the thorny topic of AI and its ethical impact on society. Most have taken place around Agentic AI and…
…
continue reading

1
The need for QTSPs. It’s not an easy job!
16:19
16:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:19Verifiable credentials (VCs) are digital attestations designed for secure and decentralized identity management within the European Digital Identity Wallet (EUDI Wallet). They use cryptographic signatures, and decentralized identifiers (DIDs) for authentication, privacy, and interoperability. The EUDI Wallet integrates VCs for secure storage, prese…
…
continue reading

1
Trusting Videos in the Digital Age
12:55
12:55
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
12:55In today's interconnected world, the concept of trust has taken on new dimensions. With the advent of technology and the proliferation of online interactions, trusting people in the digital age has become both a necessity and a challenge. As we navigate this complex landscape, it is essential to understand the nuances of trust and the strategies th…
…
continue reading
The important thing is not to panic! There appears to be no real rush. The 2026 deadline is a year away, and all potential QTSPs are pushing off the decision do to take the plunge and invest in their future. However, this appearance of plenty of time is an illusion! Deadlines do have a real habit of rushing towards you. So maybe just a mild panic m…
…
continue reading
This is a common English phrase, used in other languages too, and means that whatever I say or consent to, can be trusted. So, what is the history and how relevant is it in today’s digital age? We must not confuse this phrase with identity verification ‘per se’. Whilst the two are closely related, the verification of an identity does not imply cons…
…
continue reading
Money, Money, Money, must be funny....... I’ve begun to question whether this assertion remains entirely true. Traditionally, money has been divided into two distinct forms: •Anonymized money—banknotes, cash, micropayments, coins. •Larger identifiable sums, typically transferred via bank transactions, drafts, PSD2 mechanisms, etc. While considerabl…
…
continue reading

1
The Global Digital Conference in Geneva – Some Thoughts on Global Identity Ecosystem Resilience
9:30
The Global Digital Conference in Geneva – Some Thoughts We have a vast dependence of Digital Signatures and resilience is everything. More and more processes are needing to become Qualified Trusted Service Providers, and implicit in that is becoming reliant on qualified digital signatures to sign attestations, documents, and almost every important …
…
continue reading
This is a tongue-in-cheek approach to thinking about cyber-security for SMEs, using the analogy of the three little pigs and their houses of straw, sticks, and bricks. Its a simple introduction for non-professionals.Jon Shamah által
…
continue reading

1
The EU Business Wallet - Efficiency and Trust for Commerce
10:45
10:45
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
10:45The European Business Wallet In the Euro area alone, there were over 66 billion non-cash transactions last year, equating to approximately 21 transactions per capita annually. Additionally, the value of online B2B transactions exceeded 1.5 trillion euros, so it is no surprise that attention is now turning to the European Business Wallet.…
…
continue reading

1
What WSIS+20 Taught Me About Digital Identity and Global Governance
11:24
11:24
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:24I went to Geneva to understand what, if anything, people were saying regarding digital identity and standards in a governance-focused forum. My brain is now full. I adore the topic of identity and the standards development process; everything from the brilliant minds, the challenges, and the intense edge cases.…
…
continue reading
The increasing convergence of new technologies is reshaping the digital landscape in ways that often go unnoticed. A key development within this transformation is Agentic Artificial Intelligence (AI)—systems designed to operate autonomously, make decisions, and achieve predefined objectives without constant human intervention. g tasks, making decis…
…
continue reading

1
Its Summer Time but its no time to rest dealing with important digital issues
11:52
11:52
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:52☀️ Summer might suggest relaxation, but it's a critical time for digital vigilance. With rising cyber threats and the push for secure digital identity solutions across Europe, strategizing and safeguarding infrastructures can't take a holiday. As competition and regulatory pressures grow, consistency and trust must be prioritized—even when the sun’…
…
continue reading
Much like "the cloud" or "the superhighway", the metaphor of a "wallet" has become convenient shorthand for a tangle of technical, policy, and usability decisions. As we keep building out digital identity ecosystems with verifiable credentials, identity wallets, and cross-jurisdictional trust models, I ask: is the metaphor still helping us?…
…
continue reading

1
Local Flavors, Global Reach: Why Digital Identity Needs Cultural Context
11:33
11:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:33What do you think of when someone says "digital identity"? Biometrics? Login credentials? A string of JSON data? Your social media account? The answer probably depends on where you are, how old you are, and/or how tech-savvy you are.Heather Flanagan által
…
continue reading

1
Too Small to Hack? Busting the Myth Putting Your Business at Risk with Sarah Armstrong-Smith
28:17
28:17
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:17In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Sarah Armstrong-Smith, Best Selling Author and Co-Host of the Cyber Sisters podcast, to dismantle the dangerous myth that SMEs are "too small to hack," how cloud-based tools can bolster resilience, and how the right mix of AI…
…
continue reading

1
Can Data Protection Be Cybersecurity's Greatest Ally? with Richard Hancock
17:34
17:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
17:34In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Richard Hancock, Data Protection Officer at GlobalSign, to discuss how data protection intersects with cybersecurity strategy and why strong encryption standards and identity verification are fundamental to preventing cyber-a…
…
continue reading

1
Why Shorter Certificate Lifespans are a Hidden Security Opportunity with Kevin Naidoo of Quantum PKI
22:02
22:02
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:02In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Kevin Naidoo, Founder and Engineering Lead at Quantum PKI, to explore the challenges of managing shorter certificate lifespans and the importance of automation when it comes to certificate lifecycle management (CLM).…
…
continue reading

1
Why Banning AI in Your Company Is a Huge Mistake with Richard Stiennon
25:46
25:46
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
25:46In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Richard Stiennon, Chief Research Analyst at IT-Harvest. Together, they explore the revolutionary impact of AI on cybersecurity operations. From practical applications in threat hunting to essential PKI management practices, Richard…
…
continue reading

1
Why Women in Tech Make Businesses More Secure with Jane Frankland and Lila Kee
29:11
29:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:11In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Jane Frankland, CEO of KnewStart, and Lila Kee, Chief Product Officer at GlobalSign. Together, they discuss the evolving role of women in cybersecurity, including why diversity matters, bridging the gender gap in tech, how AI…
…
continue reading

1
Why PKI Is the Last Unbreakable Pillar of Cybersecurity with Olivier Ruff of RNTrust Group
24:39
24:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
24:39In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Olivier Ruff, Cyber Security Lead and CTO at RNTrust Group, to dive into the evolving landscape of digital identity, the critical role of PKI in cybersecurity, why digital trust is the invisible shield protecting your busines…
…
continue reading

1
Are Your Digital Certificates Ready for Tomorrow? With Henrik Dürr of TRUSTZONE
23:26
23:26
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
23:26In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Henrik Dürr, CEO and Founder of TRUSTZONE, to explore the evolving landscape of digital certificates and PKI management. Henrik shares the challenges of shorter SSL certificate validity periods, the rise of automation protocols lik…
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, heal…
…
continue reading

1
Exploring the Importance of Identity Governance with Craig Ramsay, Omada – Podcast Episode 102
25:27
25:27
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
25:27Let’s talk about digital identity with Craig Ramsay, Senior Solutions Architect at Omada. What is Identity Governance and Why is it important? Craig Ramsay, Senior Solutions Architect at Omada joins Oscar to explore all things Identity Governance including – the role of Identity Governance in compliance with regulations and standards, how it affect…
…
continue reading

1
The Right Time to Invest in Identity and Access Management (IAM) with Jesse Kurtto, Ubisecure
28:02
28:02
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:02Let’s talk about digital identity with Jesse Kurtto, DPO and Data Scientist at Ubisecure. Is now the right time to invest into Identity and Access Management (IAM)? Join us for episode 101, as Oscar is exploring why now is the right time to invest into IAM with Jesse Kurtto, DPO and Data Scientist at Ubisecure – as they delve into the current econo…
…
continue reading

1
Digital Identity Buzz: Passwordless, Identity Wallets & Digital Money with Heather Flanagan, Spherical Cow Consulting and David Birch, 15Mb
32:07
32:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:07Let’s talk about digital identity with Heather Flanagan, Principal at Spherical Cow Consulting and David Birch, Principal at 15 Mb, author, advisor and commentator on digital financial services. This is the 100th episode of Let’s Talk about Digital Identity – in this special episode two of our most popular guests, Heather Flanagan and David Birch, …
…
continue reading

1
The Missing Identity Layer of the Internet with Gautam Hazari, Sekura.id
33:19
33:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:19Let’s talk about digital identity with Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id. Join this episode of Let’s Talk About Digital Identity where Gautam Hazari, mobile identity guru, technology enthusiast, AI expert and futurist & is the CTO of Sekura.id joins Oscar to discuss the miss…
…
continue reading

1
Generative AI in Identity Verification with Russ Cohn, IDVerse – Podcast Episode 98
26:29
26:29
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:29Let’s talk about digital identity with Russ Cohn, the (Go-To-Market) for IDVerse. In episode 98, Russ Cohn the Go-To-Marketing for IDVerse joins Oscar to explore Generative AI within Identity Verification – including what is generative AI and deepfakes, why deepfakes are a threat for consumers and businesses, and some of the biggest pain points in …
…
continue reading

1
The Role of Verifiable Credentials in Digital Identity with Riley Hughes, Trinsic – Podcast Episode 97
28:59
28:59
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:59Let’s talk about digital identity with Riley Hughes, Cofounder and CEO at Trinsic. This week, Oscar is joined by Riley Hughes, Cofounder and CEO at Trinsic and host of the Future of Identity podcast. They delve into Verifiable Credentials, including what verifiable credentials are, some examples and success stories of how these are being used and i…
…
continue reading

1
Unlocking Trust: Exploring vLEI & Self Sovereign Identity (SSI) with Drummond Reed & Andy Tobin, Gen – Podcast Episode 96
36:12
36:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:12Let’s talk about digital identity with Drummond Reed, Director of Trust Services at Gen and Andy Tobin, Commercial Director, Europe at Gen. In this series opener of Season 5, Drummond Reed and Andy Tobin join Oscar to explore vLEIs and Self Sovereign Identity (SSI). They explore what LEIs and vLEIs are, how SSI principles are used within vLEIs, the…
…
continue reading

1
Exploring the Latest Updates in Global Assured Identity Network (GAIN) with Elizabeth Garber and Mark Haine
33:07
33:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:07Let’s talk about digital identity with Elizabeth Garber and Mark Haine, co-editors of the Global Assured Identity Network paper. In episode 95, Elizabeth Garber and Mark Haine, who were editors on the Global Assured Identity Network (GAIN) paper, join Oscar to share the latest updates for GAIN, including recapping what GAIN is, the challenges that …
…
continue reading

1
Single Sign-On Best Practices: How Organisations can Implement SSO with Keith Uber, Ubisecure
26:58
26:58
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:58Let’s talk about digital identity with Keith Uber, VP in charge of Sales Engineering at Ubisecure. In episode 94, Keith joins Oscar to delve into Single Sign-On (SSO) best practises and how organisations can implement SSO – including technical aspects, how it used in practise and the advantages of SSO. [Transcript below] “The best type of single si…
…
continue reading

1
Understanding the Cultural Aspects of Digital Identity with Kalev Pihl, SK ID Solutions – Podcast Episode 93
33:59
33:59
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:59Let’s talk about digital identity with Kalev Pihl, CEO of SK ID Solutions. In episode 93, Oscar is joined by Kalev Pihl, to answer ‘What are the cultural aspects of digital identity?’ They delve into the role of culture in shaping digital identity and how digital identity is being treated as a detached technology, without considering cultural diffe…
…
continue reading