Showing a passport at the border, a driver’s license to the police, or your ID card when buying a house are all examples of how we prove who we are today. It seems we take for granted everything that a central authority (in this case our local government) has done to securely store our identifying data to issue our physical ID documents.

We trust our “analog” IDs and automatically extend this trust into the digital world. We easily disclose sensitive personal data to get an extra discount while shopping online. We believe that our Facebook profiles are secure enough to provide to local service providers. Or, we send sensitive business and personal information over insecure websites when applying for COVID-19 emergency aid funding, to name just a few examples.

But the online world is different: the number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things talking to each other and to us will soon exceed earth’s population[1] by more than three times and the same is valid for social media identities[2]. COVID-19 has locked down in one way or another more than 2.6 billion people and as a result security incidents have grown up 40 percent due to home working. And while investments in IT security are growing, the number of cyber threats and incidents is rising even faster[3]. So is their scale and the damage they cause. Human error is one of the key factors behind the success of these attacks.

So, how can we identify ourselves online securely and effectively? How can we work, shop, “meet” a doctor or trade cryptocurrency in a safe and secure manner?

We have no choice but to reclaim full control of our digital identity and our sensitive data.

I am very proud that IBM is part of a solution that helps us do exactly that.

Based on the IBM POWER platform, the Swiss startup Vereign has built a blockchain that enables a decentralized, self-managed identity solution. Vereign has chosen IBM POWER architecture, because of the completely open system stack – from the foundation of the hardware through the software stack. Such a digital identity relies on open source and open standards and allows users to verify authenticity across the web while keeping data sovereignty. It can be added to any type of service and automatically meets GDPR and other key compliance requirements. Find out more about it here.

Do you have full control over your digital identity? Do you maintain that control when sharing sensitive personal data online? Let me know what you think over on LinkedIn.




Was this article helpful?

More from Cloud

IBM Cloud Virtual Servers and Intel launch new custom cloud sandbox

4 min read - A new sandbox that use IBM Cloud Virtual Servers for VPC invites customers into a nonproduction environment to test the performance of 2nd Gen and 4th Gen Intel® Xeon® processors across various applications. Addressing performance concerns in a test environment Performance testing is crucial to understanding the efficiency of complex applications inside your cloud hosting environment. Yes, even in managed enterprise environments like IBM Cloud®. Although we can deliver the latest hardware and software across global data centers designed for…

10 industries that use distributed computing

6 min read - Distributed computing is a process that uses numerous computing resources in different operating locations to mimic the processes of a single computer. Distributed computing assembles different computers, servers and computer networks to accomplish computing tasks of widely varying sizes and purposes. Distributed computing even works in the cloud. And while it’s true that distributed cloud computing and cloud computing are essentially the same in theory, in practice, they differ in their global reach, with distributed cloud computing able to extend…

How a US bank modernized its mainframe applications with IBM Consulting and Microsoft Azure

9 min read - As organizations strive to stay ahead of the curve in today's fast-paced digital landscape, mainframe application modernization has emerged as a critical component of any digital transformation strategy. In this blog, we'll discuss the example of a US bank which embarked on a journey to modernize its mainframe applications. This strategic project has helped it to transform into a more modern, flexible and agile business. In looking at the ways in which it approached the problem, you’ll gain insights into…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters