Protecting the EU’s critical infrastructure from cyberatta... October 2023 by Juan C. Asenjo

The critical infrastructure is commonly defined as the systems and networks that provide basic services…

Back to the future of hardware security modules April 2023 by Juan C. Asenjo

In a scene from the 1980s hit movie Back to the Future, Marty (played by…

Chocolate vs Vanilla? We’ve all heard that before. But wha... March 2022 by Juan C. Asenjo

Chocolate or vanilla is a familiar question we are often asked. Whether its cake, ice…

Leapfrog your PKI – Don’t let a skills shortage stifle b... February 2022 by Juan C. Asenjo

Most of you will be familiar with the term leapfrog. Stemming from a children’s game,…

Why You Need a Root of Trust to be an eIDAS Trust Service Pr... January 2022 by Juan C. Asenjo

We have come a long way in the digital transformation journey. In little over a…

Are you the keymaster? September 2021 by Juan C. Asenjo

If you grew up in the 80s, you will remember the line: “Are you the…

Partly cloudy with scattered precipitation and isolated stor... March 2021 by Juan C. Asenjo

Television weather reporters are often made fun of when their forecast calls for partly cloudy…

Hamilton and instant card issuance August 2020 by Juan C. Asenjo

Since the Broadway premier of Hamilton in 2015, the critically acclaimed musical has become an…

Cloudy with a probability of a breach July 2020 by Juan C. Asenjo

In the 2009 movie Cloudy with a Chance of Meatballs, food instead of rain begins…

Leopard Spots and Zebra Stripes: Big Data and Identity Manag... June 2018 by Juan C. Asenjo

The expression “a leopard cannot change its spots” maintains that it is challenging to alter…

  • Sort by

  • Topic