When Identity Is Re-Established at Scale, Trust Becomes the Weakest Link
Previously in the series: Why the Help Desk Is the Most Exploitable Identity System You Own
Previously in the series: Why the Help Desk Is the Most Exploitable Identity System You Own
Simple Reason: You’re Trying to Escape Passwords Using… Passwords???
Most organisations believe they understand identity breaches.
For years, security teams have focused their attention on perimeter controls, authentication flows, and privileged access. Meanwhile, one of the most critical identity systems in the organisation has remained largely invisible, under-governed, and dangerously over-trusted.
And why no amount of MFA will fix it...
How VO and Verifiable Credentials Help Universities Shut the Door on Financial-Aid Fraud and Phantom Enrolments
A guest post on Know Your Worker from our friends at TechVision Research.
In today’s digital landscape, proving who performed an action and ensuring identities cannot be falsified is crucial. Non-repudiation and preventing impersonation attacks are key to securing online transactions, yet traditional authentication methods often fall short.
OpenLearning will incorporate VO’s technology to issue secure, independently verifiable digital credentials to learners upon course completion.
Some thoughts after visiting Identiverse 2025.