Category: Ideas

  • Wider’s High Assurance Digital Identity Maturity Model

    Wider’s High Assurance Digital Identity Maturity Model

    High Assurance Digital Identity for #IoT (and #IoMT) doesn’t just happen. You have to build distinctive competence within your enterprise and without. This is our first draft.

  • High Assurance Digital Identity in Healthcare

    High Assurance Digital Identity in Healthcare

    We know we need High Assurance Digital Identity. But we don’t know what this is, exactly. However, to realize the full potential of Internet of Things (IoT) investment we must approach the Identity of Things (IDoT) differently than what we are accustomed to for the identity of persons. We believe the true value of IoT…

  • Quick and Dirty Maturity Modeling

    Quick and Dirty Maturity Modeling

    Would you like to be better? To be great with your Identity of Things? Wider Team talked with experts and friends about this for the last year. We grouped kinds of competencies and capabilities. And we’ve even seen some “walk before you run” dependencies. So, maturity models, right?   Specifics about our model are another post.…

  • Wasting your IoT Data?

    HADI (High Assurance Digital Identity) impair the ability of healthcare and pharmaceutical research to: establish provenance of data, secure data handoffs across systems and organizations, tie data to a patient, and orchestrate data from multiple devices in an encounter into a common view.

  • call for comment on NIST draft: Establishing Confidence in IoT Device Security: How do we get there?

    call for comment on NIST draft: Establishing Confidence in IoT Device Security: How do we get there?

    Last week’s NIST cybersecurity white paper came across our desk and we’re reading up. Establishing Confidence in IoT Device Security: How do we get there? The abstract model from Figure 1 is useful for organizing work from the vantage of stakeholders. Aspects: functional, business, human, timing, data, boundaries, composition, lifecycles, and communication. Concerns: safety, privacy,…

  • #ResistIoT: IoT as a medium for surveillance

    The internet of things is the most human of digital identity technologies. Unlike cloud technologies, we touch, hear, smell, and see things. They are real like kittens and roads. Damian Glover wrote yesterday about institutional blockers to IoT. Our interviews revealed personal resistance to IoT adoption, too. Cultural blockers of IoT are classic fears in…

  • Why is IoT arriving slower in some industries? Identity and other blockers

    Our team talks with many digital identity and IoT professionals each week. One of our Michaels remarked that diffusion of innovation and propagation of both IoT and digital identity seems uneven. Three examples of uneven IoT and Identity of Things adoption…   🏭 Medical device factories IDoT is already pervasive within high assurance settings such as…

  • IIW topics that excite us

    We talked about this week’s Internet Identity Workshop (#32!) on one of our team calls. What sessions would make us jump out of our seat? Our short list. Rugged identity for IoT. Nearly all identity systems break with power outages, network interruptions, really long latency, really low bandwidth, and device tampering. HADI maturity models. How…

  • 2021’s first Vienna Digital Identity Meetup

    Identity Wallets – The Vienna Digital Identity Meetup #19 from Michael Shea on Vimeo. We thought Identity Wallets (the place where your personal DIDs and Verifiable Credentials (VCs) are stored) were the topic for our 19th Vienna Digital Identity Meetup* on 25 January. It was much more. We had two presenters: Riley Hughes, CEO from Trinsic…

  • The Wider Team Blog

    Digital identity is about trust. Everyone and everything trusts (and distrusts) everyone else. It’s what makes people and cyberspaces and bodies work together. We all try to do better, using great tools and practices. So let’s explore about how ubiquitous intelligence, pervading the worlds around and within us, build and share trust through identity and…

  • By 2030, Captcha for AI

    By 2030, Captcha for AI

    Ask any sysadmin and they’ll tell you humans are the easiest way to penetrate a network. Been that way long before Kevin Mitnick. In 2020, deep fake tools and GPT-3 are convincing. How soon before they defeat prove-you’re-human tests? Then, how long before they convincingly replicate the behavior of trusted network devices? WiderPoV: Ten years…

  • By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    What if we checked each of our vendors? And their vendors? And their vendors? And their vendors? And their… WiderPoV: Vendor security screening is rare in industry. Only the largest of institutions have the will, clout, and resources to force vendors to vet. So, three responses to this crisis. 1. Join an ecosystem (or make…

Blog at WordPress.com.