It’s been over four years since 5G was introduced and the technology has now been rolled out across all the world’s major economies. So, we’re starting to think about what’s coming next….

Expansion into emerging markets

With 5G already embedded across North America, Europe and leading economies in Asia, it is a maturing technology. The pace of 5G adoption globally is increasing, and its deployments across India and Nigeria are indicative of its growing role in global communications.

The next phase of 5G will see its continued expansion into emerging markets with planned networks expected in Turkey and southern Africa over the next few years. In fact, according to GSMA Intelligence data, over half of mobile connections are expected to be via 5G by 2030.

With mmWave (MMW) providing a considerably higher capacity, there is an ongoing debate over whether 5G represents a long-term alternative to traditional fibre broadband. However, in markets where the physical infrastructure for fibre does not exist, it is easy to see that 5G is ideally suited.

Adapting to evolving digital behaviours

Shifting patterns in business and consumer behaviour will continue to shape how 5G is deployed. Indeed, digital transformation in industry and beyond will see the volume of data traffic continue to boom, resulting in heightened demand for 5G as existing networks struggle to cope.

This digital transformation is also leading to the development of more 5G capable technology. The growing number of use cases will continue to drive demand for 5G services as the limited capacity of previous generations of mobile connectivity fall short.

The development of 5G-Advanced

At the heart of the next phase of 5G is the development and introduction of 5G-Advanced. An important next step on the path to 6G, 5G-Advanced will deliver improved support for extended reality (XR) technology, enabling more seamless VR, AR and cloud gaming programmes. It will also make use of the latest developments in AI to improve network energy efficiency, load balancing and mobility management.

5G-Advanced will also support multicast services – a key priority for network operators. This allows for the transmission of the same data across a network of devices which is essential in mission critical group communications such as for the emergency services.

5G-Advanced Internet of Things (IoT) solutions such as connected vehicles, smart metres and remote monitoring tools will account for a significant share of 5G connections – and these will be increasingly available at a much lower cost.  This will further fuel the adoption of 5G-Advanced as it becomes more accessible to businesses with varying degrees of capital.

Beyond this, Satellite 5G (Non-Terrestrial Networks) will benefit us all by bridging the digital divide and providing ubiquitous connectivity.

A promising outlook

The rollout of 5G has already resulted in a dramatic shift in how we use mobile technology – and it is meeting several other priorities for network operations including positioning accuracy and enhanced integration with drone and satellite technology.

Ultimately, by embracing 5G innovation, we will achieve significant benefits – notably the digital transformation of enterprises which will lead to higher productivity and economic growth. Additional advantages include better digital access, reduced travel time, more engaging consumer services and new opportunities to create a more sustainable world.  SIMs and eSIMs  are crucial here to enable the full 5G promise to both enterprises and users.

There are huge societal benefits of 5G and the industry needs to keep pushing the boundaries of what’s possible. Find out more about the evolution of 5G in the latest report by GSMA Intelligence: https://www.thalesgroup.com/sites/default/files/database/document/2023-02/tel-global-mobile-trends-2023.pdf

The post Introducing the next phase of 5G appeared first on Cybersecurity Insiders.

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized users access to company systems.  

With the growth in AI tools recently, phishing attempts are becoming even more sophisticated and harder to spot. The outcomes of a successful attack can have wide reaching and devastating consequences. Not testing the awareness of phishing among employees, however, is worse.  

Protect your digital assets with simulated phishing attacks 

The best approach to enhance vigilance among employees and safeguard your digital assets is by conducting controlled phishing campaigns, which train employees to recognize and mitigate potential risks. But even after sending out mock phishing e-mails, the outcome can be hard to predict. Will a lot of users click on the link and submit their credentials on our ‘malicious’ website?  

Top tips to improve your phishing campaign 

Lots of employees falling for a phishing campaign may seem like the antithesis of the exercise. But, for those employees who think they are savvy to all the risks, it will be a stark warning for just how sophisticated phishing has become, and how easy it is to fall victim.  

Want to know how to make your phishing campaign more successful? Then continue reading a find our three most valuable tips to improve your phishing campaign, your company’s security awareness, and your cyber security. 

Pressure users to perform an action 

Step one: craft a phishing email scenario that taps into your employees’ interests. When December arrives, what better way to grab their attention than by discussing Christmas gifts? Who wouldn’t be excited about that? By playing on their curiosity and excitement, you increase the likelihood that your employees might overlook certain details in the email, making them more susceptible to falling for a phishing attempt. 

Keep it short and concise 

Second, make sure that the phishing e-mail is short and to the point. Just a quick message with an added link to the page where the employee can submit their Christmas gift preference, for instance. Tone will also be essential here; if it’s for a gift, keep it light and informal. If it relates to a task that needs completing urgently, make sure the message is formal and leans on the importance of the task to the business. This approach increases the chance that users will read the whole e-mail without questioning about its legitimacy, and will eventually click on the malicious link and submit their credentials. 

Make it urgent and add a deadline 

The third and final tip is to create a form of ‘time pressure’ for the user, related to Cialdini’s scarcity principles. Sticking with the Christmas scenario, you can write down that employees have to respond before a certain day in order to receive their gift, so they feel pressured to submit their choice quickly. That psychological time pressure decreases the chance that the user will deeply inspect the phishing e-mail and recognizes it as a malicious message. This results in a higher chance of employees submitting their credentials. 

Now that we’ve covered all three tips, it’s time to put them into action in your next phishing campaign and set yourself up for great success. Remember to follow up with additional training as necessary to reinforce these learnings. Stay tuned for more insightful blogs where we’ll delve deeper into the fascinating world of phishing. 

 

For further reading please check out the following:  

The post How to make your phishing campaign a success appeared first on Cybersecurity Insiders.

Whether you work in the tech field or not, it’s likely that you’ve increasingly heard of quantum computing.  

As with any emerging technology, along with all the possibilities there are also potential risks. We’ll be unpacking these latest developments, what it means for the digital identity market, and what Thales is doing in response.  

 In this blog we’ll be giving an introduction to quantum computing, and what this means for security and cryptography.  

What is quantum computing?  

Quantum computing is a type of computing that uses quantum mechanics to perform calculations much quicker than traditional computers.  

By using quantum algorithms, these computers can perform calculations that are faster than classical computers for certain types of problems, such as those involving prime factorization or optimization. Think of it like a maze. A classical computer solves the maze by exploring each path one at a time until it finds the right one. A quantum computer can explore all possible paths at once, which means it can solve the maze much faster. 

 As a relatively new and rapidly developing field of technology, there are still challenges to overcome before it has practical applications. However, quantum computing possesses the potential to revolutionize the way our digital infrastructures are secured. 

What security risks does quantum computing carry?  

As with any new technology, as well as rewards there are also risks. Because quantum computers can solve certain problems that classical computers can’t, it could potentially break many of the cryptographic systems we use today.  

 Quantum computing poses a potential risk to digital identities due to its ability to break traditional encryption methods that are commonly used to protect sensitive data, including personal and financial information. 

The majority of encryption methods rely on the difficulty of factoring large numbers into their prime factors. However, quantum computers can perform certain calculations much faster than classical computers, including factoring large numbers using Shor’s algorithm. This means that quantum computers could potentially break widely-used encryption algorithms like RSA and Elliptic Curve Cryptography (ECC), rendering digital identities vulnerable to theft, fraud and exploitation. 

 Additionally, quantum computers could also be used to ease the finding of collisions in  the hash functions that are used to create and authenticate digital signatures, thus allowing to impersonate legitimate digital identities 

 The rapid development of quantum computing represents a challenge to the security of digital identities, and new methods of encryption and authentication may need to be developed to keep pace.  

What is post quantum cryptography, and how can it help?  

Post-quantum cryptography (also known as quantum-resistant cryptography) is a type of cryptography that aims to develop new cryptographic algorithms that are resistant to attacks by quantum computers.  

Post-quantum cryptography aims to develop new cryptographic algorithms that are secure against attacks from both classical and quantum computers. These algorithms typically rely on different mathematical problems that are believed to be hard to solve, even for quantum computers. For example, some post-quantum cryptographic algorithms are based on lattice-based cryptography, code-based cryptography, or multivariate cryptography. 

As quantum computing technology continues to evolve, post-quantum cryptography is becoming increasingly important in securing sensitive data and communications. Governments, financial institutions, and other organizations are actively exploring and investing in post-quantum cryptographic solutions to ensure that their sensitive data and communications remain secure in the face of quantum computing attacks. 

For further reading, please check out the following:  

The post What is post-quantum cryptography and why is it important? appeared first on Cybersecurity Insiders.

As the healthcare industry digitises, security is a growing concern for consumers and businesses alike. Our healthcare data is perhaps the most personal information we have, and every effort needs to be made to keep it secure.

There is broad consensus that using a password to access sensitive information is not robust enough, not to mention inconvenient, which is where healthcare smart cards come in. These smart cards are essentially ‘healthcare passports in your pocket’. Unlike paper documents – which can easily be forged – healthcare smart cards are tamper-proof physical devices that authenticate patients and healthcare professionals.

In this blog we share four breakthrough innovations which are being adopted to secure confidential patient data and future-proof eHealthcare services. And these are not just hypothetical use cases: we’re proud to say that all these innovations have recently been adopted and implemented by Moore4MedicaL (M4M), a consortium of 66 companies, universities and institutes working together to accelerate innovation in emerging medical devices with open technology platforms…

 

  • Quantum-safe cryptography: Across all sectors, there are concerns that quantum computing could introduce new security risks. With quantum computing, encryption that would have previously taken years to break, could now be compromised within minutes. Fortunately, there has been some major innovation happening to combine pre-quantum and post-quantum defence mechanisms in healthcare smart cards. This layer of security will help to protect patient data – even when quantum computing has become more commonplace and is being increasingly weaponised by cybercriminals.

 

  • Fido2 authentication: FIDO2 is a global authentication standard developed by FIDO Alliance, an open industry association focused on reducing the over-reliance on passwords. We’re proud to say that, for the first time, healthcare smartcards are now FIDO2 certified – which means that patients can register and login securely to FIDO2-compliant online services. For M4M, this innovation means patients can now gain secure access to its monitoring data service and get early detection of any health issues.

                                                                                                                

  • Interoperable updates after issuance: Some personal data will naturally change over time (e.g. emergency contacts). Following the introduction of LDS2, electronic documents can now be updated through secure and interoperable access to patient’s data. This is a great example of  recent travel industry standards being used in an innovative way to improve healthcare services.

 

  • Security updates after issuance: It is now possible to address future possible threats by updating the electronic documents in a secure way. The M4M healthcare smart cards are demonstrating OS Agility, which means the ability to update the embedded software after the document issuance and enhance the device security.

The future of healthcare services relies on reliable identities, and continual innovation is needed to improve the way we authenticate both patients and healthcare professionals. While M4M is demonstrating best practice in the healthcare sector, it’s important to remember that these features could also benefit many more governments, public authorities, and private entities in civil identity and public security. Cross-collaboration across sectors will help to stay one step ahead of cybercriminals.

The post 4 Major Innovations in Healthcare Smart Cards appeared first on Cybersecurity Insiders.

A career in biometrics means changing the future. Your work can have a direct positive impact on the lives of individuals and communities worldwide – helping them to access essential services easily, move and travel seamlessly, and be part of a safer world.

But what does it take to develop your career in biometrics? Whether you’re just starting out, are looking to secure a new role, or simply want to step up your performance at work, our team have shared their top tips to achieve success…

Be a team player

Some biometrics professionals will have embarked on this career path with a scientific background, while others may bring specialist expertise in identity management or cybersecurity. To develop secure, ethical, sustainable, and user-centric solutions, collaboration is key; so respect the different knowledge and skills that each team member brings to the table. Reliable identity and biometrics solutions are developed by multi-disciplinary teams, not in silos.

Be curious

This is a rapidly evolving field – but the development and adoption of biometric technologies is happening at a different pace around the world. Biometrics professionals should invest time in building their knowledge of the different identity challenges, regulatory environments and ESG considerations in various regions. An in-depth understanding of global challenges will help teams to focus their innovation efforts in the right areas and create solutions that address specific regional needs.

Adopt a problem-solving mindset

Biometrics often involves complex challenges, such as improving accuracy, addressing security vulnerabilities, or enhancing user experience. The most important skill here is to really listen to the challenges that clients (e.g. governments and organisations) are grappling with. High-performing biometrics professionals will adopt a problem-solving mindset – seeking out innovative and practical solutions to meet customer challenges.

Put people first

Biometrics professionals cannot afford to get distracted by all the potential use cases of this technology and innovating for the sake of it. Instead, their focus should always be on building responsible products and services that build trust for both users and service providers. A strong focus on transparency and ethics is not only the right thing to do, but it will help to protect the entire industry’s reputation and enhance future job prospects.

By following these tips, you can pave the way for a successful career in biometrics, making significant contributions to building a more trusted future.

You can check out the latest jobs at Thales here: https://www.thalesgroup.com/en/career

The post Future careers: how to make it in biometrics appeared first on Cybersecurity Insiders.

What is identity? 

Did you know that identity is actually a mathematical term? It belongs to the scientific theory of social mathematics, which was first studied in the late 18th century by French mathematician and philosopher, Marie Jean Antoine Nicolas de Caritat, marquis de Condorcet. Identity refers to the algebraic concept of equality among citizens in terms of their legal rights and obligations. Marquis de Condorcet, who became famous for the Condorcet’s paradox, came up with the term when studying the relationship between the individual and the collective as a way of formalising the foundations of the democratic system. According to him, if a nation and / or multiple individuals “identically” accept the rules of the community, they attain the status of citizens.

However, identity has also come to express the differences between us. Simply speaking, identity is a combination of your physical and behavioural traits that define who you are. For example, your name is part of your identity, as is the form and colour of your eyes and your fingerprint. This set of characteristics allows you to be definitively and uniquely recognisable.

Identity plays an important role in empowering individuals to exercise their rights and responsibilities fairly and equitably in a modern society. It is imperative for social, economic and digital inclusion as it provides access to basic human rights such as healthcare, pensions, social benefits, the ability to exercise our right to vote, and beyond. But to be able to access those rights, one needs to be able to prove that they are who they claim to be.

Usually official documents such as passports and identity cards are used as a proof of your name, and your photo on these documents is the most natural link to who you are.

Official identity as a proxy for inclusion

If a country’s citizens don’t have access to an official identity, they are much more likely to miss out on a variety of essential services, du

 

e to the fact that identity touches so many aspects of our lives. For citizens, identity provides them with access to state programs that support their wellbeing. As an example, Jamaica recently approved the use of biometric authentication systems to verify those citizens accessing social welfare benefits.

Yet an official identity system is also beneficial for governments. With more citizens registered they have a much better chance of accurately understanding their population’s demographics, which in turn plays an essential role in impactful policy making.

It is for these reasons that access to a legal identity has been recognised by the United Nations General Assembly as being a fundamental sustainable development goal – ensuring a legal identity from birth to all by 2030.

Nonetheless, getting a population registered is not an easy task and there are many barriers to reaching everyone – both due to physical geographical landscapes and a lack of infrastructure to support the collection of information. On the government side, the space tends to be a fragmented one, with multiple overlapping and incompatible systems being deployed at the same time. In general, there is a lack of coordination between civil registration and identity, and with other state systems that have their own registration and credential systems. Moreover, a proportion of the population is excluded because of excessive charges, indirect costs, and convoluted processes, or simply because they don’t have physical access to the service.

So how can we ensure the responsible adoption of official identity and the necessary protections around it which ensure that it is a tool for public good?

The role of foundational ID systems

Unique identity or foundational ID systems are general-purpose identity platforms that are designed to support all forms of identity. There are no multiple or redundant registrations, meaning that one registration is created for use with all state systems. Furthermore, foundational ID systems offer improved service delivery and economies of scale, and as identity becomes a readily available commodity, a new ecosystem of different applications naturally emerges. One such ID system is India’s Aadhaar, thanks to which nearly 80 percent of India’s citizens have access to critical government services.

Here’s how an individual’s identity is established:

  • The user’s unique biographical (name, date and place of birth, etc.) and biometric data (fingerprint) is captured
  • It is then validated to establish the uniqueness of the request for an accurate digital identity
  • This unique identity is then verified against existing data in internal or external systems
  • The biometric and biographical data is authenticated against physical documents
  • And finally, a unique identity is created in the foundational system, and a private unique identity number (UIN) is assigned to the person.

Achieving identity inclusion has become ever more urgent in the aftermath of the COVID-19 pandemic as public health and economic challenges are pressuring governments to deploy essential measures such as social safety nets, health, and labour programs that ensure the health & wellbeing of the population and help restart their economies. One important link for enabling these is that all measures require inclusive identification of the population.

My colleague Jaume Dubois, who is an identity system specialist at Thales, will join other experts in the field for the ID4Africa discussion to tackle the issue of identity and inclusion and share examples of policies, approaches and technologies that have proven successful. The discussion will take place on 16 September 2020 at 2:30pm CET on International Identity Day.

We invite you to learn more about the underpinning technology and processes for secure delivery of ID services.

Hype Cycle™ for Digital Government Technology, 2021 Survey

Download the Gartner Research

The post What is identity and why is it important? appeared first on Cybersecurity Insiders.

World Password Day has come around again. Since its inception, it’s an awareness day designed to promote and reinforce the importance of better habits when it comes to password settings. As such, we expect to be inundated with research highlighting the percentage of consumers who still have ‘poor’ password habits, lists of the most common ones still in use, and accompanying advice from a multitude of companies reinforcing what ‘good’ looks like.

Now, as passwords are often the first port of call for our online / digital identities – it’s of course important that good habits are encouraged. However, the headlines and research we’ll see on this day won’t have changed, the stories and issues are the same – we’re stuck in Groundhog Day.

With this in mind, we’re taking this opportunity to look into the problem with passwords, and how we might want to change how we think about securing digital identities.

Too Many to Remember

Do you know how many passwords the average consumer has? A recent study from NordPass found that it’s around 100 – an increase of 25% in recent years. That’s unsurprising given the pandemic had us all signing up for new online services – be that for entertainment, personal or work purposes. There are countless other studies out there, and while the average figure may vary slightly, they all point towards the same thing – it’s an unmanageable amount.

At this juncture it’s worth asking yourself if you know how many passwords you have? If you have an iPhone there’s a quick way you can find out using the following steps (the final number might be sobering):

  1. Start the Settings app.
  2. Tap “Passwords”
  3. Tap “Website & App Passwords.” Authenticate with FaceID or TouchID
  4. Your iPhone will now display the complete list.

There’s also a way to find this out via Google Chrome:

  1. On your computer, open Chrome
  2. At the top, click More Settings
  3. Select Passwords, Check Passwords

Information Overload

Having an unmanageable number of passwords correlates with the coinciding factor that consumers are faced with information overload. Put simply, there’s a lot of rules and guidance to follow. Official best practice on what makes a good password varies depending on who you ask, general advice includes.

  • Using three random, unconnected words. Official advice from the National Centre for Cyber Security (NCSC)
  • At least twelve characters, including a mixture of upper- and lower-case letters, numbers and special characters I.e. “R3plac!ng l3tt€rs with numb3r$”

Not only should they meet certain specifications, but it’s also recommended that they are updated regularly – as an example some employers and IT departments will force employees to update them at least every six weeks.

There’s a lot of rules to follow, especially as we’re meant to have a different password for every account. Password managers are often touted as the best way to manage this, but whichever way you cut it, it puts almost all the responsibility on the end- user.

The consequences for weak and easy to guess passwords are clear – and you can hardly make it through the month without a high-profile data breach hitting the headlines. However, all things considered we can hardly act surprised that the text-based password continues to plague individuals and organisations alike.

In part two, we’ll be discussing why we need to look at a password-less future of digital identification.

Click here to read part two

The post Why are passwords still a problem in 2023? appeared first on Cybersecurity Insiders.

If you’ve read part one, you’ll know that there’s a persistent problem with passwords. Despite the continued warnings, data breaches and endless guidance – a weak and easily hackable password guards a sobering number of online accounts and identities. Past experience tells us this is unlikely to change.

However, the technology is here, and already in use to help us do away with them for good.

It seems fitting then, that on World Password Day this year Google has announced a move that takes it one step further to ditching passwords for good by rolling out passkey technology. Designed to replace passwords entirely, passkeys allow authentication with fingerprint ID, facial ID or pin on the phone or device you use for authentication. Apple has begun rolling out the tech in iOS16 compatible devices, and Microsoft has been using it through the Authenticator app.

Keen to get rid of the passwords for all your Google accounts? Just visit this link, and follow the instructions.

This is just the start, and more innovations like this will follow.

Digital IDs gives consumers control and convenience

As discussed in our previous blog, it’s highly likely that that average consumer has passwords in the hundreds. These passwords will guard anything from their Netflix account, through to their online banking; while the security risks are very real, so is the temptation to use easy to remember phrases. In today’s digital age we all value privacy and control, but also convenience and efficiency.

Thankfully, the rise of Digital IDs mean that consumers get this level of control over their digital identities; all through one single point of access. At the same time, it provides authorities with the opportunity to create companions for physical identity documents that are: straightforward to issue, manage and verify; delivering a powerful tool to fight ID fraud, reduce red tape and boost efficiency.

Across the globe, digital identification is becoming more mainstream; with new measures constantly coming to fruition to make this the norm. If we look to the EU we have the introduction of the latest legislation on European Digital Identity – eIDAS2. eIDAS2 means that by September 2023, each EU Member State must make a digital ‘wallet’ available to every citizen who wants one. Service providers in both public and private sector organisations (such as banks and telcos) will have to accept it as proof of ID.

This acceleration isn’t just taking place in  the EU – just earlier on this month the UK government proposed legislation to secure digital identify, even creating a  the Office for Digital Identities and Attributes.

Bolstering security with behavioural biometrics

Most of us have become accustomed to using biometrics in some form in recent years; with facial recognition, or fingerprint readers becoming increasingly prevalent on most smartphones today. In many instances, these biometrics can also be used to verify purchases.

The virtues of biometrics as opposed to text-based passwords are well accepted – and recent advances in this technology means that we can look beyond fingerprint and facial recognition to an approach based on each individuals’ unique characteristics.

Behavioural biometrics is an innovative approach to user authentication. It can identify a user (or an imposter) based on a set of unique patterns, like the way someone: moves a mouse, type on a keyboard, or the time spent on an activity. These traits are also reinforced with device-based indicators such as IP addresses and geo-location data.

Risk assessment rules can then be applied to each transaction, ensuring that an appropriate authentication level is always actioned. For example, a low-value purchase made by a consumer near their home can be processed instantly. If a high-value purchase, not in keeping with that user’s normal behaviour, is attempted then the transaction can be blocked, or additional authentication requested. ​

The business case for a password free future

Our recent Data Threat Report found that over a third of businesses across the globe have experienced a data breach in the last 12 months. More often than not, the weakest link in the security chain is the employee. This is often through small but harmful mistakes – such as an easy to guess password. The new normal of hybrid working also opens up a new host of cyber security challenges.

Organisations should consider adopting access management solutions. One such example is password-less verification, which identifies users through methods such as IP address or multi-factor authentication. This will overcome the inherent vulnerabilities of text-based passwords, while improving levels of assurance and convenience.

In conjunction with this, adoption of a Zero Trust model, based on the principle “Never Trust, Always Verify”, requires employees to only access data they’re authorised to do so, while ensuring they verify who they are each time they require access.

Heading towards a password-free future

If we journey back to 2004, at the RSA Conference, Bill Gates predicted the death of the password stating: “There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure.”

18 years on and we’re still at the stage where passwords are the dominant means of securing digital identities. With cyber-attacks and data breaches increasing in frequency; and cybercriminals becoming increasingly sophisticated; it’s vital that we head towards a password-less future.

The good news is this isn’t a futuristic pipe dream, but the technology is already there to make this happen; there are already some good examples in use. That said, in the meantime, don’t use 123456, qwerty, password or 654321 to guard your online accounts!

The post World Password Day 2023: Why we need a password-less future appeared first on Cybersecurity Insiders.

Did you know that tattoos were some of the first forms of identity verification? They were ways to display attributes such as social status, familial ties and associations with certain groups.

Similarly, did you know that we can record the use of fingerprints back to the ancient Babylonians who used them to seal business transactions on clay tablets?

Identity verification has been around for thousands of years, constantly evolving with societal change and technological advancements.

The latest evolution is that of digital identities, which are fast changing how we verify who we are, bringing with it advantages for individuals, businesses, governments and organisations.

In this article for Business Reporter, Justin Walker, VP Digital Transformation at Thales, looks back at our understanding of identity and how it has developed drastically over hundreds, and even thousands of years.

Read the full article here: The history of digital identity.

For further reading, please check out the below:

The post How has identity evolved over the years? appeared first on Cybersecurity Insiders.

Podcasts have undergone a full-blown renaissance in recent years. Whether it’s high-profile celebrities and musicians, online influencers, or catching up on the news agenda from the journalists themselves, more than 400 million people globally now listen to content in this format.

They are a great way to stay informed, learn something new, or be entertained – often on the go. Given this is a technology blog, we wanted to share some of the best tech-related podcasts out there right now.

  1. In Machines We Trust – Launched in August 2020, this is one of the world’s most popular podcasts focused on artificial intelligence, and the impact it is having on our lives. Published by MIT Technology Review, it has explored everything from digital twins, breakthroughs in AI and computing history, to how AI is helping test and train pilots.
  2. The Digital Human – This BBC Radio 4 podcast is a weekly series looking at some of the big questions surrounding technology and its impact on both our society and psychology. Hosted by broadcaster Aleks Krotoksi, recent topics have included what the rise of algorithmic curation means for the arts, how far we can trust digital technology implanted in our bodies, and what it means to be solitary in our digital world.
  3. CYBER – Published by VICE Magazine, this series is all about the world of cybersecurity. Covering everything from disinformation to encryption, cyber threats to facial recognition, new episodes are published every few days, and looks at the biggest cybersecurity news right now.
  4. Hard Fork – This New York Times podcast is hosted by long-time technology journalists Kevin Roose and Casey Newton, giving a weekly look at the biggest stories in technology right now. Each episode is around an hour long, offering a deep dive into NY Times’ tech and business reporting from the journalists involved.
  5. Babbage – Published by The Economist and richly reported, this series is a weekly documentary-style report on a different topic in the area of science and technology each week. Each 45-minute episode is published every Wednesday, with host Alok Jha talking to correspondents from right across The Economist about the new discoveries, developments and innovations that are shaping our world.
  6. The Tech Talks Daily – Hosted by tech columnist Neil Hughes, this is a daily interview series with startup founders, sports teams, business leaders, and the occasional celebrity, looking at their career history, tips and advice for others, as well as sharing more about the company they work for now and what they stand for.
  7. Pivot – Hosted by tech journalist Kara Swisher and New York University Professor Scott Gallaway, new episodes of this series are released every Tuesday and Friday covering the biggest stories in tech, business and politics. Recent stories have included ongoing developments with Twitter, tech layoffs, and movements around AI.
  8. Masters of ScaleTaking a slightly more business and leadership-oriented perspective, this podcast is an interview series featuring business leaders across technology, consumer brands, charities and other innovative startups and venture capital funds. Each guest speaks with LinkedIn co-founder Reid Hoffman, discussing their career journey and what’s made them successful, as well as learnings along the way.
  9. TED TechFeaturing some of the world’s best thinkers and speakers looking at the interaction between technology, society, science, business and innovation, this weekly podcast is a collection of audio from TED Talks around the world to provide inspiration and ideas.
  10. CyberWire DailyThis daily podcast is aimed at cybersecurity industry leaders and covers the day’s biggest threat intelligence, policy, research and more. Every episode also features a guest from within the industry, from cybersecurity companies to Government agencies.
  11. Thales Security Sessions – At Thales we have our own successful podcast – Security Sessions. This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technology that make it all work behind the scenes. We speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of cloud security.

Do you have a favourite not included on this list? Let us know in the comments below.

The post Here are 11 of the best technology podcasts you should listen to appeared first on Cybersecurity Insiders.