-
Cybersecurity News Round-Up: Week of November 9, 2020
The feds got a big take this week with a seizure of Bitcoins valued at more than a billion dollars. The money was tracked back to a hacker who stole them from Silk Road.
-
PKI Solutions and 5 Reasons Partners Should Consider Them
We should expect the remote work trend to continue well into 2021 and beyond – putting just about every business at risk of cyber attack. But there’s way to keep companies secure, and that’s with Public Key Infrastructure (PKI).
-
Is Your SSL Provider Breaking Your Heart? A Checklist for Finding Your Ideal Match
The good news: breaking up with your current SSL provider isn’t so hard to do. And to make it as simple as possible, we’ve created a handy checklist for you.
-
The “Who, What, How” of eIDAS
Find out who needs eIDAS-compliant digital certificates for electronic signing, what problems they solve, and how they are implemented.
-
Cybersecurity News Round-Up: Week of November 30, 2020
2020 may be winding down but the cyber attacks are not. The most concerning this week is a series of incidents at companies and government institutions involved with the distribution of Covid-19 vaccinations.
-
What is Business Email Compromise?
In these days of constant impersonal email communication BEC has become a common threat. To minimize your company's risk, try implementing the following strategies.
-
Cybersecurity News Round-Up: Week of November 16, 2020
IoT security for the US government took a big step with the US Senate unanimously passing the Internet of Things Cybersecurity Improvement Act of 2020.
-
What Is Zero-Party Data and Why Is It Essential for Marketers Today?
The data landscape now is completely shaken as browsers have made third-party cookies obsolete. Apple, too, has given its users the option to opt-out of sharing IDFDs or IDs for advertising. So, where can CMOs and CIOs get data to make campaign decisions?
-
Protect IoT Devices and Supply Chains from Emerging Threats
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain threats.
-
Why Are You Removing Website Identity, Google and Mozilla?
Today there’s a huge wave toward protecting consumer privacy – in Congress, with the GDPR, etc. – but how can we protect user privacy on the web without establishing the identity of the websites that are asking for consumer passwords and credit card numbers?