Exploring mutual TLS, pre-connection authentication, machine multi-factor, digital-first identities, and cutting-edge security technologies shaping the future.
Retrofitting databases and legacy web applications with mutual TLS based identity and access control with no business disruption. A practical ...
This article is the first in a mini series of two articles that explore the need for a fundamental shift in the cybersecurity industry's approach to combating cyber crime. The discussion highlights the limitations of relying solely on advanced tools and tactics, emphasizing that such an approach can only lead to an ...
In this white paper we talk about the current challenges associated with online elections, their potential to interfere with democracy and how the anonymously validated identity model can solve the problem. The gist behind the model is that it anchors identities inversely with respect to current single sign on ...
The concept of identity is fundamental to every human inhabited environment. We are not "The Borg", we participate in society as individuals, we contribute to the whole, both as consumers but also as creators, with time, effort, ideas and beyond the philosophical debate of "who am I", from a practical standpoint, the ...
There is a huge security flaw in the fabric of the Internet. Today's IP based cyber security methods cannot differentiate malicious traffic from normal until the traffic has been consumed because IP based attribution is weak. Those working behind a VPN or a LAN look like they have a single IP address; some obfuscate ...
That for me was the answer to the riddle. Since then, my friends and I have been on a mission to replicate this effective dynamic in cyberspace and provide businesses and people with means to enable a state of security instead of continually having to fight for it. I am Stefan, the founder of Identity Plus and I ...
LEGAL
Copyright © 2025,
Identity Plus, Inc., New Hampshire, USA,
All rights reserved