Industry blog

Posted: 04 Aug 2020
mchandarana's picture

It shouldn’t come as a surprise that we are talking about TLS/SSL digital certificate lifespan again; after all, the industry has been mandating a shorter lifespan for TLS/SSL certificates for the past few years. It is good...

Continue reading >>
Posted: 03 Aug 2020
fjacquot's picture

The passport is a rather peculiar identity document — unlike most other documents, it is issued by one country and checked in another country. A passport’s sole purpose is to prove that a person is who he or she claims to be, making this identity document and the information stored in it important to a country’s national security.

...

Continue reading >>
Posted: 23 Jul 2020
ilowe's picture

Simple, secure, seamless: it’s what every security professional wants in a physical identity and access management (PIAM) solution, but wanting is a far cry from reality. PIAM relies on collecting, analyzing, using, and reporting on security information in a centralized way. Whether you’re...

Continue reading >>
Posted: 28 Jul 2020
eanderson's picture

The concept of Zero Trust is a security model where all users and devices are treated as untrustworthy, even if they are already inside a network. The term Zero Trust is credited to Forrester Research based on a security model they published in 2010, which...

Continue reading >>
Posted: 20 Jul 2020
cbunney's picture

Ask anyone for their first impressions about visiting London, and they might tell you about the London Underground train network, or “The Tube” as the locals call it. The route map for this network is a national icon, recognized by many people long before they reach London. It is symbolic of a transport logic and an underground world concealing more than one hundred and fifty years of...

Continue reading >>
Posted: 16 Jul 2020
mchandarana's picture

Digital certificates secure everything from devices to web pages, but only if they’re properly managed. Technologists who follow public key infrastructure (PKI) and IoT have identified two key trends that will have a broad impact on this market space. The first is that digital certificate lifespans continue to...

Continue reading >>
Posted: 15 Jul 2020
mchandarana's picture

Transport Layer Security (TLS), or famously known as Secure Socket Layer (SSL), are cryptographic protocols that establish an encrypted connection between a browser and a web server. This connection protects data privacy and integrity as communication between both parties remains encrypted. In short, it keeps...

Continue reading >>
Posted: 15 Jul 2020
vgourmelen's picture

What are the costs for a country to design, implement and succeed in its transition to digital citizen IDs? We will look at the costs and considerations to moving to digital ID, and we’ll explain why experienced companies from the identity sector are in the best position to ensure a smooth coexistence between traditional and digital ID programs....

Continue reading >>
Posted: 09 Jul 2020
jcarpenter's picture

Identity and Access Management (IAM) is central to keeping business applications, systems, and data secure. The evolution of the cybersecurity landscape means that IAM vendors need to adapt quickly, listen to their customers, and develop authentication systems that protect employees, customers, and other users across the enterprise....

Continue reading >>
Posted: 06 Jul 2020
jandler's picture

Hospitals and clinics are places where everyone deserves to feel safe — staff, patients, employees, contractors, and others. Part of that security comes from having a strong and robust visitor management system that allows you to understand and control everyone coming into the facility.

...

Continue reading >>

Pages