Industry blog

Posted: 20 Nov 2019
jmacinnis's picture

While we enjoy the business opportunities, productivity gains and user conveniences of our data-driven economy, we certainly do not enjoy the cost and devastation of having accounts hacked, clients’ data stolen or employees’ identities misused.

In the quest for data integrity and secure credential management, public-key infrastructure (PKI) has long proven its effectiveness as a key...

Continue reading >>
Posted: 29 Oct 2019
jmacinnis's picture

As a collaborative effort between the government and the cybersecurity industry, National Cybersecurity Awareness Month (NCSAM) is held every October. The educational month helps raise awareness of how businesses and individuals can protect themselves online. With criminals, hackers, and other bad actors continually developing how they attack and gain access to systems and data, we must...

Continue reading >>
Posted: 23 Oct 2019
jmacinnis's picture

Whether it’s in whitepapers, news stories, sell sheets, or on display at trade shows, industry jargon around authentication is practically inescapable. In today’s threat landscape, there’s certainly justification for keeping these topics front-of-mind and sparking conversation.

But when authentication concepts start to get a little tangled, it can be hard to know if you’re speaking the...

Continue reading >>
Posted: 01 Aug 2019
jmacinnis's picture



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking...

Continue reading >>
Posted: 26 Jun 2019
jmacinnis's picture

Finding the right identity and access management (IAM) solution can be a challenge. With dozens of vendors and products in the marketplace, how do you pick the right one? The following is a guide to help you identify the unique needs, challenges and various factors in your organization to consider when selecting the perfect IAM solution and vendor to meet your security goals.

...

Continue reading >>
Posted: 15 May 2019
jmacinnis's picture

The oil and gas and critical infrastructure industries were the #1 targets by nation-state sponsored cyberthreat actors in 2017-18. Cyberattacks pose a significant threat causing major business disruption, downtime and loss of intellectual property. Rapid digitization of production tools across the industry can also increase the threat landscape unless properly mitigated.

...

Continue reading >>
Posted: 15 Oct 2018
jmacinnis's picture

PKI certificate technology has long been a foundational technology in securing web traffic between users and web services. PKI (public key infrastructure) defines the method that a web browser uses to determine that a website is genuine and belongs to the correct business or organization. In other words, PKI certificates are used to ensure the identity of a remote computer/server.  Most...

Continue reading >>
Posted: 17 Aug 2018
jmacinnis's picture

California Governor Jerry Brown signed into law the California Consumer Privacy Act (CCPA) of 2018 on June 28, 2018. The law pertains to businesses that collect personally identifiable information (PII) in the State of California. Businesses found violating CCPA including security breaches, may be charged with statutory damages as well...

Continue reading >>