Blog Posts

Protecting digital healthcare’s puppies and unicorns June 2021 by Jenn Markey

Arguably no other sector has felt the impact of COVID-19 more than healthcare. Beyond being…

How Sodexo Is Reinventing Digital Payments for Daily Lunch P... June 2021

Digital cards are not only a megatrend,  they are also a true change in consumer…

We’re stronger together June 2021 by Jenn Markey & Amanda Walt &

Being in cybersecurity in the era of SolarWinds and Colonial Pipeline, we know a thing…

Does your mobile device trust you? June 2021 by Jenn Markey

It’s almost 14 years to the day that Apple launched the first iPhone, changing our…

Another Wake Up Call for Cybersecurity Vigilance June 2021

In the last few weeks, we have seen a flurry of cybersecurity breaches as well…

With Single Factor Authentication You’re One Step Away fro... June 2021 by Jenn Markey

Security is only as strong as your weakest link. And, as the bad actors know,…

2021 Hong Kong Encryption Trends: As cyber threats grow, Hon... June 2021 by Jiro Shindo

The digital landscape has changed in profound ways over the past year, and the pace…

ID card and credential software issuance systems must infuse... June 2021 by Bret Gens

Secure ID cards and financial credentials like credit and debit cards have a lot in…

Entrust Reinvents Digital Cards and Mobile Issuance With Uni... June 2021 by Nicolas Bruley

Banks and card issuing processors can now use a single software development kit to add…

A Road to a Consistent Encryption Strategy May 2021 by Philip Schreiber

Unlike the rest of the world, adoption of enterprise-wide encryption strategies has not grown in…

  • Sort by

  • Topic