- March 12, 2024
- Iris Jennifer Jo
Understanding Digital Connections: SSL in Hong Kong
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of…
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious…
The NIST-led National Cyber Security Center of Excellence has once again provided industry specific practical guidance with its guide to Securing Electronic Health Records on Mobile Devices. The new…
Granting access to the B2B portal based on password, or federated identity from the customer domain is typically enough. Access can only reveal information such as pricing, discount percentage,…
Website builder Unbounce enhances the value of its portfolio with SSL Certificates which improve customer trust and boost website conversions.
Is the concern over developing solutions to address the constrained resources associated with IoT a preemptive investment? Is effort devoted to developing holistic solutions diverting focus from…
Identity and access management (IAM) projects can be quite complex and there are many reasons why projects may fail. We've been developing IAM solutions for over a decade now and have a great track…
As our channel base keeps expanding, we have been busy building training and resources to meet the needs of our diverse partner community. The result? A new and improved version of our Partner…
The OTA is well known for its online security initiatives, including Data Privacy and Protection Day and the annual Online Trust Audit and Honor Roll, and earlier this year announced it was expanding…
As the Internet of Things (IoT) continues to drive more devices connected to the Internet, more security risk are potentially exposed. Identity and access management solutions will begin to play a…
In the context of document signing, digital signatures are often described as the electronic equivalent of a wet ink signature, but I'm beginning to think that description doesn't do them justice.…
With the latest release of our identity and access management (IAM) solution, we're extending our support towards OAuth 2.0, one of the candidates to offer security for the IoE. OAuth is not about…
When we access networked data, it travels through several layers from the physical cable all the way to the application. Could this same type of layer model work for Identity as well? Let's try it...
Federation is a technology term for transferring a user identity from one domain to another transparently. For the end user, it typically means that they can access online services of other companies…
Virginia law tackles electronic fraud in order to protect consumers from identity theft.
A well-executed and thoughtfully integrated identity and access management (IAM) solution can help marketing departments in several areas of web marketing initiatives. As an IAM professional, you need…
The main differentiation between ECC and other cryptographic approaches, such as the current RSA standard, is that it allows for a smaller key size, which reduces storage and transmission…