• New GlobalSign IAM Solution Release

    June 24, 2015

    With the latest release of our identity and access management (IAM) solution, we're extending our support towards OAuth 2.0, one of the candidates to offer security for the IoE. OAuth is not about…

  • Layer Model for Identity

    June 17, 2015

    When we access networked data, it travels through several layers from the physical cable all the way to the application. Could this same type of layer model work for Identity as well? Let's try it...

  • Benefits of Federation

    June 10, 2015

    Federation is a technology term for transferring a user identity from one domain to another transparently. For the end user, it typically means that they can access online services of other companies…

  • New Virginia Digital Identity Law Strengthens Consumer Protection

    June 04, 2015

    Virginia law tackles electronic fraud in order to protect consumers from identity theft.

  • IAM and the War on Clicks

    June 03, 2015

    A well-executed and thoughtfully integrated identity and access management (IAM) solution can help marketing departments in several areas of web marketing initiatives. As an IAM professional, you need…

  • ECC 101: What is ECC and why would I want to use it?

    May 29, 2015

    The main differentiation between ECC and other cryptographic approaches, such as the current RSA standard, is that it allows for a smaller key size, which reduces storage and transmission…

  • GlobalSign IAM Customer DNA Honored with EIC Award

    May 27, 2015

    At KuppingerCole’s recent European Identity & Cloud (EIC) Conference in Munich, Germany, the analyst firm honored GlobalSign’s customer DNA Ltd, a large European cable and mobile services provider,…

  • Countdown- Preparing for increased controls around Electronic Security Perimeters NIST CIP V5

    May 26, 2015

    For many Bulk Power System owners and operators, there’s nothing funny about preparing for the April fool’s day 2016 deadline for North American Electric Reliability Corporation (NERC) Critical…

  • Announcing new Partner Program

    May 21, 2015

    Announcing new Enterprise Partner Program for System Integrators and Value Added Resellers

  • IAM for Business

    May 19, 2015

    Too often in the IT security market, we paint dark clouds in the horizon, use scare tactics and quote other experts who are also trying to frighten customers to buy security solutions. But, I do have…

  • How do Digital Signatures Work? A Look Behind the Scenes

    May 18, 2015

    The benefits of adopting digital signatures in place of paper-based, wet-ink signatures are obvious - reduce paper waste, decrease operating costs, speed up document delivery, to name a few - but…

  • OAuth-Much More Than Facebook

    May 07, 2015

    The proliferation of mobile devices is increasingly driving the need for strong authentication as more high-value transactions are taking place online, and more customers and employees are accessing…

  • Reflections on CSA's Security Guidance for Early Adopters of the Internet of Things

    May 06, 2015

    The article highlights seven security controls tailored to IoT environments, which aim to mitigate risks with the new technologies and environments. Here I wanted to comment on some of the salient…

  • Keeping the Secrets of the Seven Kingdoms

    April 29, 2015

    The airing of the first episode of Game of Thrones season 5 was a big event for millions of people worldwide. Surprisingly the first four episodes were leaked to the torrent sites almost…

  • IoT vs. Traditional PKI Deployments

    April 28, 2015

    While there are already a number of early stage IoT deployments using standard PKI capabilities, as the number of devices continues to grow and become more varied, it's likely PKI as it stands today…