Category: Privacy & Security

Search

Here’s How Credit Unions and Banks Can Save 20,000 Staff Minutes a Month

Credit unions and banks can save a massive 20,000 minutes a month – which translates to about 4–5 staff members’ time – by implementing a…

Can an Existing Digital Identity Wallet Leverage a Hardware Security Module to Meet New EU Standards?

Anonyome Labs will co-present a paper with Australia’s Queensland University of Technology (QUT) at the 8th Symposium on Distributed Ledger Technology in Brisbane, Australia from…

Aries VCX: Another Proof Point for Anonyome’s Commitment to Decentralized Identity 

For nearly two years, Anonyome Labs has co-maintained an open source project from Hyperledger called Aries-VCX. VCX is an important decentralized identity (DI) community project,…

How to Take Back Control of Your Digital Footprint: Get RECLAIM 1.1!  

Recently we released RECLAIM, powered by MySudo, a new digital identity footprint management tool that helps you reclaim control of your personal information from the…

The Top 10 Ways Bad Actors Use Your Stolen Personal Information

A bad actor isn’t only a poorly skilled thespian (ha ha). It’s also a person (or group) who intentionally acts to cause harm to a…

3 Things to Know About the New American Privacy Rights Act 

Here at Anonyome, we stay abreast of current thinking and conversation around privacy and identity management, from technology innovations to regulatory changes. Today, we’re looking…

These are the 10 Most Popular ‘Privacy Files’ Podcast Episodes  of All Time

Our hugely popular ‘Privacy Files’ podcast sits in the top 1% of podcasts worldwide for longevity in the market.  Listeners love it because it makes…

Will Quantum Computers Break the Internet? 4 Things to Know

The short answer is yes. The long answer is they will, but quick action could ease the damage.  Quantum computers harness the laws of quantum…

The Surprising Outcome of Our Comparison of Two Leading DI Governance Models

Our Chief Architect, Steve McCown, recently compared two of decentralized identity’s leading governance models—trust registries (from Trust Over IP or ToIP) and trust establishment (from…

How MySudo Lets You Control Who Sees Your Personal Info Online and in Real Life

Guess what? Despite the soaring rates of data breaches and scams, you don’t have to be a sitting duck for criminals. MySudo gives you complete…

Is the Cloud Safe Enough to Store Files?

Cloud storage is amazing — and risky The 2000s may be over, but cloud storage is still amazing. Services such as Dropbox, Apple’s iCloud, Google’s…

6 Ways Web3 and Decentralized Identity Technologies Could Stop Deep Fakes

Artificial intelligence (AI) has many upsides, but a significant downside is its role in creating deep fakes and other identity theft fraud mechanisms. The technology…

Want to Monetize Privacy? Here’s How to Do it, Fast

Let’s face it, organizations face many barriers to offering privacy products. For companies that offer consumers pieces of the privacy and security puzzle, innovating and…

12 Holiday Scams to Avoid this Christmas

Holiday scams can ruin your holidays in seconds, so here’s what to look for to avoid falling victim. Most holiday scams are everyday scams dressed…

This is How You Go Fast to Market with Privacy and Identity Protection Apps

If your company has recognized the enormous opportunity to meet the needs of 86 percent of consumers globally who are concerned about their privacy online,…

4 Steps to Setting Up MySudo to Meet Your Real Life Privacy Needs

We want you to get the most out of the world’s only all-in-one privacy app, MySudo, so here are 4 simple steps for setting up…

2 Ways to Give Your Customers Privacy Products, Not Just Privacy Advice

We’re betting that your customers are growing increasingly concerned about safeguarding their personal data in an increasingly connected digital world. With data breaches and other…

4 Ways Financial Institutions Can Use Decentralized Identity to transform the ID and Verification process

Know your customer (KYC) and identity verification activities present a major barrier to consumer satisfaction and efficient operations for financial institutions. Financial institutions need secure…

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Never Miss An Update

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.