Featured Post

Ownership, Control and Possession – Options for Key Management in the Cloud

READ POST

Most recent posts

2022 – Looking Back, Moving Forward with TLS

January 2022 by Bruce Morton

Looking back at 2021 In 2021 we have seen that HTTPS is everywhere and TLS 1.3 protocol use continues to grow. The CA Security Council (CASC) has been reborn as the PKI Consortium. There are new certificate transparency (CT) policies,…

Why You Need a Root of Trust to be an eIDAS Trust Service Provider

January 2022 by Juan C. Asenjo

We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions, paired with mobile phones and tablets now allow us to do many things on the move, including major purchases and…

The workplace has changed. So should your building security strategy.

January 2022 by Martin Hoff

There’s no denying that the meaning of “workplace” has changed in every way possible. Now, working from anywhere is no longer a concept, but a reality. We’ve seen that there’s no single answer that works for every organization on how…

E-invoicing accelerates in MEASA

December 2021 by Jim DeLorenzo

While the global pandemic has presented organizations with many IT-related challenges, it has also helped to accelerate some digitization projects. Indeed, while spending on traditional IT has been flat or even falling over the past 18+ months, organizations are increasingly…

VIEW ALL POSTS

All Topics

All Contributors

×

👋 Hello, if you have any
questions, I'm ready to chat.

Chat Now