Why You Need a Root of Trust to be an eIDAS Trust Service Provider

January 2022 by Juan C. Asenjo, PH.D., CISSP

We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions,…

Are you the keymaster?

September 2021 by Juan C. Asenjo, PH.D., CISSP

If you grew up in the 80s, you will remember the line: “Are you the keymaster?” from the original Ghostbusters…

Partly cloudy with scattered precipitation and isolated storms

March 2021 by Juan C. Asenjo, PH.D., CISSP

Television weather reporters are often made fun of when their forecast calls for partly cloudy skies with scattered precipitation and…

Hamilton and instant card issuance

August 2020 by Juan C. Asenjo, PH.D., CISSP

Since the Broadway premier of Hamilton in 2015, the critically acclaimed musical has become an American classic. The release of…

Cloudy with a probability of a breach

July 2020 by Juan C. Asenjo, PH.D., CISSP

In the 2009 movie Cloudy with a Chance of Meatballs, food instead of rain begins to fall from the clouds….

Leopard Spots and Zebra Stripes: Big Data and Identity Management | En...

June 2018 by Juan C. Asenjo, PH.D., CISSP

The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not…

  • Sort by

  • Topic

More Blog Topics