Image representing state of war

Being Secure vs Practicing Security

This article is the first in a mini series of two articles that explore the need for a fundamental shift in the cybersecurity industry's approach to combating cyber crime. The discussion highlights the limitations of relying solely on advanced tools and tactics, emphasizing that such an approach can only lead to an ...

Image representing online voting


Vote From Home

In this white paper we talk about the current challenges associated with online elections, their potential to interfere with democracy and how the anonymously validated identity model can solve the problem. The gist behind the model is that it anchors identities inversely with respect to current single sign on ...

Image representing authentication blog

The Many Faces of Authentication

The concept of identity is fundamental to every human inhabited environment. We are not "The Borg", we participate in society as individuals, we contribute to the whole, both as consumers but also as creators, with time, effort, ideas and beyond the philosophical debate of "who am I", from a practical standpoint, the ...

Image representing about banner


Identity Plus

There is a huge security flaw in the fabric of the Internet. Today's IP based cyber security methods cannot differentiate malicious traffic from normal until the traffic has been consumed because IP based attribution is weak. Those working behind a VPN or a LAN look like they have a single IP address; some obfuscate ...