A couple of months ago, there were reports on Amazon’s failed attempt to build an AI engine that would scan resumes and…
You keep seeing security products tout machine learning. You hear that it can make your life as a security professional…
I’m fascinated by the recent winning streak of Jeopardy champion James Holzhauer. What’s unique about Holzhauer’s streak is how quickly…
One of the things I appreciate about Entrust Datacard is its embrace of different working styles, particularly its support of…
Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can…
Yeah, you know you need to upgrade from SHA-1 to SHA-256. Given the number of legacy and third party products…
It’s not breaking news that we need to stop using SHA-1. Public trust CAs stopped using SHA-1 to sign certificates…
I thought about titling this blog, “Are Clients Dead?”, but that’s an absolutist question meant to provoke, and I’m getting…
If you take a look back through classic literature, particularly fairy tales, there are some themes that emerge. Parental abandonment is…
You know that you want to bring PKI into your organization. You’ve got approval from the leadership team, and you’re…
You know that you want to bring PKI into your organization. You’ve got approval from the leadership team, and you’re starting…
Almost fifteen years ago, I was teaching classes in application security at a large financial institution. When we got to…
A few years ago, identity was all about me. No, I’m not a narcissist – at least I don’t think…