Hitoshi Kokumai

Kokumai

Identity Assurance – Sufficient and Necessary Conditions

May 12, 2020

Identity Assurance It is not easy to define the ‘sufficient condition’ for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto unknown weapons to compromise the

Read More
Kokumai

How to Enhance Security of Digital Identity

October 7, 2019

Enhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave choke point of the cyber age. The word ‘password’ is poly-semantic and context-dependent. Sometimes it’s

Read More
Kokumai

History, Current Status and Future Scenarios of Expanded Password System

June 5, 2019

Future Scenarios of Expanded Password System Passwords are so hard to manage that some people are urging the removal of passwords from digital identity altogether. What would happen, then, if the password is removed from our identity assurance? Where the password

Read More
Kokumai

Four Puzzling Issues of Identity Authentication – Part 2

October 30, 2018

Caveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to

Read More
Kokumai

Four Puzzling Issues of Identity Authentication

October 24, 2018

Four Puzzling Issues of Identity Authentication – Takeaways from Consumer Identity World USA 2018 – Introduction The so-called password-less authentication, if implemented literally, would lead us to a world where we are deprived of the chances and means to get

Read More
Kokumai

Part 2 – Identity Assurance by Our Own Volition and Memory

August 7, 2018

Identity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication with no confirmation of the user’s volition would lead to

Read More
Kokumai

Part 1 – Identity Assurance by Our Own Volition and Memory

July 30, 2018

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that we advocate is now acknowledged as a ‘Draft Proposal’ for OASIS Open Projects that OASIS has recently launched as a

Read More
Kokumai

The ID Federation: What Technology Can Displace The Password?

March 25, 2016

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some

Read More
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...
10 Leading Open Source Business Intelligence Tools
Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up the decision-making process. Open Source Business Intelligence Tools make it easier to have our raw ...
David Discenza
Four Ways to Improve Cybersecurity (Updated: December 9th, 2022 ) Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
Richard Duffy
Overcoming IT Infrastructure Disaster (Updated: 03.24.2023) One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for ...
Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...