This post was originally published on the CA Security Council blog. The current browser-certification authority (CA) trust model allows a website…
Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take…
As organizations and individuals continue to look for ways to ensure the security of digital information and move away from…
The title of this post seems to be lost on some who are responsible for security architecture. One of my…
Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have…
This certificate is sometimes called unified communications certificate (UCC), multi-domain certificate or multi-SAN certificate. In this posting, we will call…
When a company decides to mobilize, it often allows many of its central processes to be governed by remote devices…
The title may come across a little more literary than a normal technology or security blog, but this is what…
Infographic Visualizes Truth on Mobile Security Our world is becoming faster and more portable every day. I can picture an…
Twenty years ago, PKI technology was introduced amidst a whirlwind of hype and expectation. But due to its cost and…