top of page
Spherity Blog


Trusted AI, Explained: How to Prepare for the Rise in Malicious AI Agents & Bots
Learn what trusted AI means in cybersecurity and compliance and how you can put it into practice—before malicious AI agents and bots explode.

Carsten Stöcker
Oct 61 min read


AI Slop, AI Noise, and the Urgent Need for Digital Trust in an Agent-Flooded Internet
AI “slop” and deepfakes erode trust online. Learn how EUBW, AISP, TEVV, and PoA can verify identity, provenance, and restore digital authenticity.

Carsten Stöcker
Aug 161 min read


From Babel to Bridge: Converging Digital Identity Across the Atlantic — Part 0
Explore how EU and U.S. digital identity frameworks converge under eIDAS 2.0 and NIST 800-63-4 to build global trust across business and supply chains.

Carsten Stöcker
Aug 21 min read


Digital Sovereignty Supply Chain Thinking: The Role of the Invisible Identity Fabric
Discover how decentralized digital identity and the European Business Wallet strengthen Europe’s digital sovereignty and secure critical supply chains.

Carsten Stöcker
Jul 281 min read


Intelligence Wars in the Digital Age: Hybrid Warfare, Cyber Sovereignty, and Securing the Supply Chain
Hybrid warfare targets identity and supply chains. Learn how DPPs, EUBW, and verifiable credentials secure critical infrastructure from covert attacks.

Carsten Stöcker
Jul 201 min read
bottom of page