• NCCoE Publishes Guide for Securing Electronic Health Records on Mobile Devices

    July 30, 2015

    The NIST-led National Cyber Security Center of Excellence has once again provided industry specific practical guidance with its guide to Securing Electronic Health Records on Mobile Devices. The new…

  • Confirm Your Transactions

    July 29, 2015

    Granting access to the B2B portal based on password, or federated identity from the customer domain is typically enough. Access can only reveal information such as pricing, discount percentage,…

  • Helping Customers Boost Conversions with SSL

    July 22, 2015

    When we talk about SSL, the first thing that comes to mind is security and quite rightly so, but there is another significant benefit to using SSL which is sometimes overlooked: improving customer…

  • Are worries of constrained devices slowing IoT security?

    July 09, 2015

    Is the concern over developing solutions to address the constrained resources associated with IoT a preemptive investment? Is effort devoted to developing holistic solutions diverting focus from…

  • How to Ensure a Successful IAM Project

    July 08, 2015

    Identity and access management (IAM) projects can be quite complex and there are many reasons why projects may fail. We've been developing IAM solutions for over a decade now and have a great track…

  • New Partner Resource Center

    July 07, 2015

    As our channel base keeps expanding, we have been busy building training and resources to meet the needs of our diverse partner community. The result? A new and improved version of our Partner…

  • Q&A with the OTA – Creating a Trustworthy Framework for the IoT

    July 02, 2015

    The OTA is well known for its online security initiatives, including Data Privacy and Protection Day and the annual Online Trust Audit and Honor Roll, and earlier this year announced it was expanding…

  • Internet of Things and IAM

    July 02, 2015

    As the Internet of Things (IoT) continues to drive more devices connected to the Internet, more security risk are potentially exposed. Identity and access management solutions will begin to play a…

  • More Than Your Electronic John Hancock - Unexpected Benefits of a Digital Signature

    June 29, 2015

    In the context of document signing, digital signatures are often described as the electronic equivalent of a wet ink signature, but I'm beginning to think that description doesn't do them justice.…

  • New GlobalSign IAM Solution Release

    June 24, 2015

    With the latest release of our identity and access management (IAM) solution, we're extending our support towards OAuth 2.0, one of the candidates to offer security for the IoE. OAuth is not about…

  • Layer Model for Identity

    June 17, 2015

    When we access networked data, it travels through several layers from the physical cable all the way to the application. Could this same type of layer model work for Identity as well? Let's try it...

  • Benefits of Federation

    June 10, 2015

    Federation is a technology term for transferring a user identity from one domain to another transparently. For the end user, it typically means that they can access online services of other companies…

  • New Virginia Digital Identity Law Strengthens Consumer Protection

    June 04, 2015

    Virginia law tackles electronic fraud in order to protect consumers from identity theft.

  • IAM and the War on Clicks

    June 03, 2015

    A well-executed and thoughtfully integrated identity and access management (IAM) solution can help marketing departments in several areas of web marketing initiatives. As an IAM professional, you need…

  • ECC 101: What is ECC and why would I want to use it?

    May 29, 2015

    The main differentiation between ECC and other cryptographic approaches, such as the current RSA standard, is that it allows for a smaller key size, which reduces storage and transmission…