SpruceID Blog

Thoughtful perspectives on identity, interoperability, and the systems that turn public policy into usable services.

How Do Verifiable Digital Credentials Actually Work? A Non-Technical Explanation

How Do Verifiable Digital Credentials Actually Work? A Non-Technical Explanation

A non-technical look at what happens when a verifiable digital credential is issued, shared, and verified.
Why Every Digital Service Should Be Measured by Completion Rate

Why Every Digital Service Should Be Measured by Completion Rate

A digital service reaches its full potential not when it launches, but when residents can easily move through it from start to finish.
The Quiet Risk of Doing Nothing: Why Delaying Digital Identity Modernization Has a Cost

The Quiet Risk of Doing Nothing: Why Delaying Digital Identity Modernization Has a Cost

Many states already pay the price of outdated identity infrastructure, they just don't see it on a budget line.
What Is Identity Proofing and Why Does It Matter for Government Services?

What Is Identity Proofing and Why Does It Matter for Government Services?

Identity proofing sits at the core of every trusted interaction between governments and the people they serve.
SpruceID’s Comments to NIST on AI Agent Identity and Authorization

SpruceID’s Comments to NIST on AI Agent Identity and Authorization

SpruceID submitted formal comments to NIST's NCCoE on how AI agents should be identified, authenticated, and authorized. Here's what we said and why it matters.
What Is Zero Trust? The Basics Explained

What Is Zero Trust? The Basics Explained

As government services move online and across systems, Zero Trust becomes essential to ensuring every interaction is secure and verifiable.
Credential Native Transformation: How Digital Identity Can Help Drive Your Modernization Strategy

Credential Native Transformation: How Digital Identity Can Help Drive Your Modernization Strategy

Even as governments improve digital services, proving identity can be where the experience falls apart.
Utah's SB 275 Turns Digital Identity Principles Into Law

Utah's SB 275 Turns Digital Identity Principles Into Law

Utah's State-Endorsed Digital Identity Program moves from policy to practice, establishing the strongest privacy framework for government-issued digital credentials in the United States.
Why Digital ID Programs Can Stall, and How to Design for Adoption from Day One

Why Digital ID Programs Can Stall, and How to Design for Adoption from Day One

State digital identity programs are expanding nationwide, but adoption rates can vary widely from one implementation to the next.
5 Signs Your Document Intake System Is Creating Security Risks

5 Signs Your Document Intake System Is Creating Security Risks

Document intake can be one of the most overlooked, and most critical, security risks in government systems.
How to Measure Digital Transformation Success with Verifiable Digital Credentials: KPIs Beyond 'Go Live'

How to Measure Digital Transformation Success with Verifiable Digital Credentials: KPIs Beyond 'Go Live'

Digital transformation success isn’t defined at launch, it’s measured by the outcomes residents and staff experience every day.
Zero Trust for Non-Technical Leaders: What You Need to Know

Zero Trust for Non-Technical Leaders: What You Need to Know

As government systems are increasingly accessed from homes, phones, and third-party vendors, Zero Trust serves as the foundation for their security.