Tag: HADI

  • Your IoT Trust Gap (and how to close it)

    Your IoT Trust Gap (and how to close it)

    Most devices today still lack strong identity. This is dangerous in healthcare as IoMT and medtech explode. This Wider Team research note expands on this with quotes from experts.

  • “We need to talk…” UX for Identity of Things conversations

    ▶⏸⏯⏭⏪⏹⏺⏮⏩◀ Play, Pause, Step Back, Jump Ahead. Our iconography for linear navigation was lifted from olde technology, the VCR, which borrowed it from audio cassette players like the Sony Walkman that recycled commands from larger reel to reel audio tape machines. We need a new iconography for identity interaction. Which interactions? What are the identity…

  • High Assurance Digital Identity in Healthcare

    High Assurance Digital Identity in Healthcare

    We know we need High Assurance Digital Identity. But we don’t know what this is, exactly. However, to realize the full potential of Internet of Things (IoT) investment we must approach the Identity of Things (IDoT) differently than what we are accustomed to for the identity of persons. We believe the true value of IoT…

  • 5 explosive takeaways from Wider Team’s first Identiverse talk

    5 explosive takeaways from Wider Team’s first Identiverse talk

    I’m horrible at linkbait blog post titles. Sorry. We’re introducing five big ideas in 20 minutes or so at Identiverse this month. Our talk is called “Identity and the Healthcare IoT Complexity Bomb.” We’re introducing corporate identity pros to the intersection of two other worlds: IoT and Healthcare. You’ll be able to explain: “Maturity in…

  • Wasting your IoT Data?

    HADI (High Assurance Digital Identity) impair the ability of healthcare and pharmaceutical research to: establish provenance of data, secure data handoffs across systems and organizations, tie data to a patient, and orchestrate data from multiple devices in an encounter into a common view.

  • #ResistIoT: IoT as a medium for surveillance

    The internet of things is the most human of digital identity technologies. Unlike cloud technologies, we touch, hear, smell, and see things. They are real like kittens and roads. Damian Glover wrote yesterday about institutional blockers to IoT. Our interviews revealed personal resistance to IoT adoption, too. Cultural blockers of IoT are classic fears in…

  • IIW topics that excite us

    We talked about this week’s Internet Identity Workshop (#32!) on one of our team calls. What sessions would make us jump out of our seat? Our short list. Rugged identity for IoT. Nearly all identity systems break with power outages, network interruptions, really long latency, really low bandwidth, and device tampering. HADI maturity models. How…

  • By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    What if we checked each of our vendors? And their vendors? And their vendors? And their vendors? And their… WiderPoV: Vendor security screening is rare in industry. Only the largest of institutions have the will, clout, and resources to force vendors to vet. So, three responses to this crisis. 1. Join an ecosystem (or make…

  • In 2021, Identity Composability proliferates telehealth services and platforms

    In 2021, Identity Composability proliferates telehealth services and platforms

    Telehealth is made of component services and devices. Identity, text chat, video chat, notes, maybe sensor history. Identity is itself composed of a number of services. What if telehealth was was a feature of something bigger? A care team collaborative tool, maybe. Or a neighborhood check-in program. A school nurse for kids. Or a… Watch…

  • In 2021, cost optimization pulls along digital identity federation

    In 2021, cost optimization pulls along digital identity federation

    Covid sucked up cash, budget, and reserves. So cost controls rule in 2021. WiderPoV: Federating identity, improving identity quality, agility, reach, trust, and reuse saves money. This is the short-term business case for high assurance digital identity, if you need it. The medium-term case: resilience against your next 17 disruptions. Long term? Opportunities to organize your…

  • In 2021, gov defensive infosec spending doubles

    In 2021, gov defensive infosec spending doubles

    2021 will have as many or more disasters as 2020. Even more cyber crime, terror, and war. Defensive cyber spending by government agencies has been a tiny fraction of offensive spending, by headcount. Dramatic events can and will change this. WiderPoV: Massive public sector hiring in prevention, intervention, and recovery will pull talent from an…

  • In 2021, biopharma and medical supply chains up their #IoT identity ecosystems

    In 2021, biopharma and medical supply chains up their #IoT identity ecosystems

    Supply chains always get short shrift. In 2020 they got attacked. The immune response? Newer identity and security models and tools. For example, Trust over IP federates governance. More visibility, live tracking, deeper tracing. WiderPoV: Supply chain identity feels like known territory, with proven tools nicely deployed giving adequate results. But expectations soared in 2020. Do…

Blog at WordPress.com.