As part of our extensively planned interactions on the future of technology planning and executions around IT DevOps. Fintech and data management trends, we had an opportunity to interact with Cloudentity’s co-founder and Chief Strategy Officer, Nathanael Coffing.
Cloudentity is a leader in providing a real-time self-healing embedded identity and security layer to Cloud-workloads by leveraging Identity and dynamic authorization to mitigate threats. You can call Cloudentity an IT automation platform for all your identity management and app authorization workflows.
Here’s a snapshot of our interaction with Nathanael.
Hi Nathanael, could you please tell us about your role and what plans you have at Cloudentity for 2022?
Nathanael: Currently, I am the Co-Founder and Chief Strategist of Cloudentity. I have extensively worked in the identity and access management space. I have worked closely with IAM products at Sun Microsystems, Oracle, and Imperva prior to founding Cloudentity. Over the years I have helped IT leaders across industries radically transform their operations by integrating disparate business systems into simple and scalable solutions.
Cloudentity provides application and security teams, a better way to automate and control how information is shared over APIs. From open banking to fraud prevention, we make it easier to deliver cloud-native applications and safer to extend your data to the customers, partners and services that drive your business.
Tell us about your plans for 2022. Which technology domain are you most keenly following and why?
Nathanael: Embedded Finance!
I think Embedded Finance will revolutionize the technology industry in 2022.
Nathanael: Strict regulations are a key to driving consumer privacy protection in 2022.
Consumers today are calling for more control over their online data and how it’s being used by companies. While government regulators enforcing privacy laws such as GDPR, CCPA and CPRA are a step in the right direction, more needs to be done to protect consumers’ privacy and this needs to start at registration and continue through API-based data sharing. Every website or app should display an icon (similar to SSL) as soon as a user opens the page that rates the certifications the company is meeting to protect their customers’ data. These must be written in a way that is easy for consumers to understand as well – no hiding behind confusing legal jargon. Then, organizations will have no choice but to be transparent with how they are harvesting, using and sharing their users’ data. The icon must provide consumers the ability to control their privacy settings on an attribute level, control their sharing of that attribute and delete their data after they are done with the website/app, so the user remains in control of their personal information at all times.
What are your thoughts for tokenization?
Nathanael: Tokenization has become a key method for businesses to bolster the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance with industry standards and government regulations. Moving this same per transaction security capability to Personal Identifiable Information (PII) can drastically reduce an organization’s attack surface. Today, most organizations continue the perimeter-based security for their distributed applications passing enriched over-privileged JSON Web Tokens (JWT) to any service that requests them. However, with the rise of third-party developers and B2B2C business models, cyber attackers only have to find the weakest link to start compromising millions of PII records.
How do you see the role of Automation in IT and Operations evolving further?
[To share your insights with us, please write to firstname.lastname@example.org]