Race for Secure Digital Identity Heats Up with New Platforms from IBM and Turing Space

IBM and Turing Space Launch New Digital Credential and Identity Platforms to Counter AI Threats

INFORMATIONAL
December 9, 2025
4m read
Policy and ComplianceRegulatoryCloud Security

Related Entities

Organizations

Products & Tech

IOTA Generative AI

Other

Turing Space

Full Report

Executive Summary

Two significant developments are accelerating the adoption of verifiable digital credentials. IBM has launched "Verify Digital Credentials," a new software platform enabling organizations to issue and manage secure, portable digital documents. This allows individuals to store credentials like licenses or diplomas on their personal devices and share them with privacy-preserving selective disclosure. In a parallel move, decentralized identity provider Turing Space announced a partnership with the IOTA blockchain to enhance its identity verification platform, focusing on reducing costs for large-scale enterprise adoption. These initiatives represent a broader industry trend towards decentralized identity as a necessary evolution to combat the rising threat of sophisticated, AI-generated deepfakes and identity fraud, which are rendering traditional verification methods obsolete.


Regulatory Details

While not a specific regulation, these developments are driven by the principles of Self-Sovereign Identity (SSI) and are built on emerging open standards from organizations like the Decentralized Identity Foundation (DIF) and the World Wide Web Consortium (W3C). The core concept is to give individuals control over their own identity data, minimizing the need for organizations to store large, vulnerable repositories of personal information. This aligns with the data minimization principles of regulations like GDPR.

IBM's Verify Digital Credentials platform focuses on:

  • Issuance and Verification: Allowing trusted entities (governments, universities, employers) to issue cryptographically signed credentials.
  • User Control: Enabling users to store these credentials in a personal digital wallet on their mobile device.
  • Selective Disclosure: Allowing users to share only the necessary pieces of information for a given transaction (e.g., proving they are over 21 without revealing their date of birth).

Turing Space's partnership with IOTA aims to:

  • Reduce Costs: Leverage IOTA's low-fee 'Tangle' infrastructure to make issuing and verifying credentials economically viable at scale.
  • Enhance Security: Use the immutability of a distributed ledger to provide a secure anchor for identity verification.

Affected Organizations

This technology shift will affect a wide range of organizations across multiple sectors:

  • Governments: For issuing digital driver's licenses, passports, and social security credentials.
  • Education: For issuing digital diplomas, transcripts, and certifications.
  • Healthcare: For verifying patient identity and managing professional licenses for medical staff.
  • Finance: For KYC/AML compliance and secure customer onboarding.
  • Technology: All companies that need to verify user or employee identity.

Impact Assessment

The push for verifiable credentials is a direct response to the erosion of trust in digital interactions. The primary drivers and impacts are:

  • Threat Driver: The rise of generative AI and deepfake technology makes it increasingly easy to create fake identity documents and impersonate individuals in video or audio, undermining traditional identity checks.
  • Business Impact: Adopting this technology can significantly reduce the risk of data breaches by minimizing the amount of PII an organization needs to store. It can also streamline onboarding and verification processes, reducing friction for customers.
  • Operational Changes: Organizations will need to shift from being custodians of identity data to being issuers and verifiers of credentials. This requires new infrastructure, processes, and integration with digital wallet applications.

Compliance Guidance

Organizations preparing for this shift should:

  1. Monitor Open Standards: Stay informed about the development of standards from W3C (Verifiable Credentials Data Model) and DIF.
  2. Evaluate Platforms: Begin evaluating platforms like IBM's or those being built by providers like Turing Space to understand their capabilities and integration requirements.
  3. Start with a Pilot Program: Identify a low-risk, high-value use case for digital credentials within your organization, such as employee ID cards or training certifications, to pilot the technology.
  4. Focus on User Experience: The success of digital wallets and verifiable credentials depends on them being easy for non-technical users to understand and operate. Any implementation must prioritize simplicity and user control.
  5. Update Privacy Policies: As your organization shifts from holding data to verifying it, privacy policies and data governance frameworks will need to be updated to reflect this new model.

Timeline of Events

1
December 8, 2025
Reports emerge of IBM's launch of 'Verify Digital Credentials' and Turing Space's partnership with IOTA.
2
December 9, 2025
This article was published

MITRE ATT&CK Mitigations

Verifiable credentials represent an advanced, cryptographically secure form of authentication and assertion, effectively acting as a superior evolution of MFA.

Mapped D3FEND Techniques:

Sources & References

IBM, Turing Space push digital credentials forward
SC Magazine (scmagazine.com) December 8, 2025
Verifiable credentials race accelerates as IBM, Turing Space launch solutions
Biometric Update (biometricupdate.com) December 8, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Digital IdentityVerifiable CredentialsSelf-Sovereign IdentitySSIBlockchainDeepfake

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading