As identity services move online and go global, IT departments are challenged with providing secure, frictionless authentication methods while also…
Yeah, you know you need to upgrade from SHA-1 to SHA-256. Given the number of legacy and third party products…
Authentication needs are changing. Passwords don’t cut it anymore. The digital transformation of business requires a new set of practices…
If a Company Gets Hacked, And Nobody Is There To Hear It, Does It Make a Sound? What if you…
In the media, as well as in our daily lives, the increased awareness of “cyberattacks” seems to have caught on…
Originally, there were just seven generic top level domains (gTLDs) and a couple hundred country code TLDs (ccTLDs). In 2012, ICANN announced…
In just a few short years, Bitcoin, the innovative cryptocurrency underpinned by Blockchain technology, has earned broad legitimacy and won…
In order to talk about any specialized field of knowledge, you need a common language with agreed upon terms, definitions…
The Internet of Things (IoT) is changing manufacturing for the better. With data from billions of connected devices and trillions…
It’s not breaking news that we need to stop using SHA-1. Public trust CAs stopped using SHA-1 to sign certificates…