Ovum Report on Cloud-Based Authentication December 2017 by Jacquelyn Painter

As identity services move online and go global, IT departments are challenged with providing secure, frictionless authentication methods while also…

SHA-1 Certificates: Talking to Your Leadership about the Business Risk December 2017 by Sandra Carielli

Yeah, you know you need to upgrade from SHA-1 to SHA-256. Given the number of legacy and third party products…

Redefining Authentication: The New Use Cases December 2017 by Jacquelyn Painter

Authentication needs are changing. Passwords don’t cut it anymore. The digital transformation of business requires a new set of practices…

3 Lessons from the Uber Hack about Protecting Consumer Data November 2017 by Stephen Demone

If a Company Gets Hacked, And Nobody Is There To Hear It, Does It Make a Sound? What if you…

Are You Among the Forty-Four Percent Who Do Not Have an Information Se... November 2017 by Stephen Demone

In the media, as well as in our daily lives, the increased awareness of “cyberattacks” seems to have caught on…

How Can I Protect My Brand TLD? November 2017 by Bruce Morton

Originally, there were just seven generic top level domains (gTLDs) and a couple hundred country code TLDs (ccTLDs). In 2012, ICANN announced…

Securing the Internet of Things: Devices & Networks November 2017 by Ranjeet Khanna

The Internet of Things (IoT) is changing manufacturing for the better. With data from billions of connected devices and trillions…

Why SHA-1 Migration is Hard, And How to Address the Challenge November 2017 by Sandra Carielli

It’s not breaking news that we need to stop using SHA-1. Public trust CAs stopped using SHA-1 to sign certificates…

  • Sort by

  • Topic