Identity Engineering

Verifying identity in a digital world.
Why the Govt can't simply go opt-out for e-health

Why the Govt can't simply go opt-out for e-health

[Blog post] Security, privacy safeguards not up to scratch.
Steve Wilson May 11 2015 12:39PM Security
CISOs' mojo lies in the metadata

CISOs' mojo lies in the metadata

[Blog post] Information surfaced has strategic advantage.
Steve Wilson Oct 28 2014 9:52AM Security
Who'd have picked a BlackBerry for the Internet of Things?

Who'd have picked a BlackBerry for the Internet of Things?

[Blog] BlackBerry has a more secure future in the physical world.
Steve Wilson Aug 26 2014 2:37PM Security
Can 'info-nopolies' be trusted with our personal data?

Can 'info-nopolies' be trusted with our personal data?

[Blog post] Citizens reduced to lab rats.
Steve Wilson Jul 8 2014 7:06AM Security
What does Heartbleed say about the craft of software?

What does Heartbleed say about the craft of software?

[Blog post] We're clearly getting it wrong.
Steve Wilson Apr 15 2014 4:35PM Security
Stop confusing privacy for secrecy

Stop confusing privacy for secrecy

[Blog post] The danger of the ‘encrypt everything’ mindset.
Steve Wilson Mar 12 2014 10:53AM Security

Log In

  |  Forgot your password?