- March 12, 2024
- Iris Jennifer Jo
Understanding Digital Connections: SSL in Hong Kong
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of…
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious…
At KuppingerCole’s recent European Identity & Cloud (EIC) Conference in Munich, Germany, the analyst firm honored GlobalSign’s customer DNA Ltd, a large European cable and mobile services provider,…
For many Bulk Power System owners and operators, there’s nothing funny about preparing for the April fool’s day 2016 deadline for North American Electric Reliability Corporation (NERC) Critical…
Announcing new Enterprise Partner Program for System Integrators and Value Added Resellers
Too often in the IT security market, we paint dark clouds in the horizon, use scare tactics and quote other experts who are also trying to frighten customers to buy security solutions. But, I do have…
The benefits of adopting digital signatures in place of paper-based, wet-ink signatures are obvious - reduce paper waste, decrease operating costs, speed up document delivery, to name a few - but…
The proliferation of mobile devices is increasingly driving the need for strong authentication as more high-value transactions are taking place online, and more customers and employees are accessing…
The article highlights seven security controls tailored to IoT environments, which aim to mitigate risks with the new technologies and environments. Here I wanted to comment on some of the salient…
The airing of the first episode of Game of Thrones season 5 was a big event for millions of people worldwide. Surprisingly the first four episodes were leaked to the torrent sites almost…
While there are already a number of early stage IoT deployments using standard PKI capabilities, as the number of devices continues to grow and become more varied, it's likely PKI as it stands today…
Treat identities as assets, and build a management framework for them. Identity and Access Management (IAM) solutions that enable external users to manage their own identities can help you improve…
Server-based solutions are gaining in popularity, in part because the signer doesn't need to carry around a token (the signing credential is stored on an HSM), and also because they can integrate with…
Microsoft has recently announced two major updates regarding their SHA-1 deprecation policy for Code Signing Certificates. The first pertains to the re-issuance of an update for supporting SHA-2 Code…
Paul van Brouwershaven, Technology Solutions Director at GlobalSign led an interactive session at WHD2015 around the current and upcoming changes in the SSL industry. Unfortunately we ran out of time…
Paul van Brouwershaven, Technology Solutions Director at GlobalSign led an interactive session at WHD2015 around the current and upcoming changes in the SSL industry, carrying out a live poll which…
Can you imagine doing business without email? The convenience and instant communication it offers have made it an essential component of everyday business and research shows over 100 billion business…