
- January 12, 2023
- Aryne Leigh Monton
2023 Cybersecurity Predictions in APAC
What’s in store for 2023? Our experts predict seven (7) emerging trends in Asia-Pacific
What’s in store for 2023? Our experts predict seven (7) emerging trends in Asia-Pacific
Learn how going digital can help you create a more efficient document signing process for your HR department!
Preventing data breaches is key to ensuring your business is protected. With the average cost of a breach increasing, here are 10 key best practices…
Is the concern over developing solutions to address the constrained resources associated with IoT a preemptive investment? Is effort devoted to developing holistic solutions diverting focus from…
Identity and access management (IAM) projects can be quite complex and there are many reasons why projects may fail. We've been developing IAM solutions for over a decade now and have a great track…
As our channel base keeps expanding, we have been busy building training and resources to meet the needs of our diverse partner community. The result? A new and improved version of our Partner…
The OTA is well known for its online security initiatives, including Data Privacy and Protection Day and the annual Online Trust Audit and Honor Roll, and earlier this year announced it was expanding…
As the Internet of Things (IoT) continues to drive more devices connected to the Internet, more security risk are potentially exposed. Identity and access management solutions will begin to play a…
In the context of document signing, digital signatures are often described as the electronic equivalent of a wet ink signature, but I'm beginning to think that description doesn't do them justice.…
With the latest release of our identity and access management (IAM) solution, we're extending our support towards OAuth 2.0, one of the candidates to offer security for the IoE. OAuth is not about…
When we access networked data, it travels through several layers from the physical cable all the way to the application. Could this same type of layer model work for Identity as well? Let's try it...
Federation is a technology term for transferring a user identity from one domain to another transparently. For the end user, it typically means that they can access online services of other companies…
Virginia law tackles electronic fraud in order to protect consumers from identity theft.
A well-executed and thoughtfully integrated identity and access management (IAM) solution can help marketing departments in several areas of web marketing initiatives. As an IAM professional, you need…
The main differentiation between ECC and other cryptographic approaches, such as the current RSA standard, is that it allows for a smaller key size, which reduces storage and transmission…
At KuppingerCole’s recent European Identity & Cloud (EIC) Conference in Munich, Germany, the analyst firm honored GlobalSign’s customer DNA Ltd, a large European cable and mobile services provider,…
For many Bulk Power System owners and operators, there’s nothing funny about preparing for the April fool’s day 2016 deadline for North American Electric Reliability Corporation (NERC) Critical…
Announcing new Enterprise Partner Program for System Integrators and Value Added Resellers