
- February 18, 2021
- Sam Bocetta
Privacy with Personality: The Trend Towards Online Pseudonymity
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
If you don’t have the right online security measures in place, you risk your business falling victim to an attack like whaling, which usually results…
The new year promises new innovations and trends – in many ways, it will be the start of a new era. In this article we'll walk you through the…
The main differentiation between ECC and other cryptographic approaches, such as the current RSA standard, is that it allows for a smaller key size, which reduces storage and transmission…
At KuppingerCole’s recent European Identity & Cloud (EIC) Conference in Munich, Germany, the analyst firm honored GlobalSign’s customer DNA Ltd, a large European cable and mobile services provider,…
For many Bulk Power System owners and operators, there’s nothing funny about preparing for the April fool’s day 2016 deadline for North American Electric Reliability Corporation (NERC) Critical…
Announcing new Enterprise Partner Program for System Integrators and Value Added Resellers
Too often in the IT security market, we paint dark clouds in the horizon, use scare tactics and quote other experts who are also trying to frighten customers to buy security solutions. But, I do have…
The benefits of adopting digital signatures in place of paper-based, wet-ink signatures are obvious - reduce paper waste, decrease operating costs, speed up document delivery, to name a few - but…
The proliferation of mobile devices is increasingly driving the need for strong authentication as more high-value transactions are taking place online, and more customers and employees are accessing…
The article highlights seven security controls tailored to IoT environments, which aim to mitigate risks with the new technologies and environments. Here I wanted to comment on some of the salient…
The airing of the first episode of Game of Thrones season 5 was a big event for millions of people worldwide. Surprisingly the first four episodes were leaked to the torrent sites almost…
While there are already a number of early stage IoT deployments using standard PKI capabilities, as the number of devices continues to grow and become more varied, it's likely PKI as it stands today…
Treat identities as assets, and build a management framework for them. Identity and Access Management (IAM) solutions that enable external users to manage their own identities can help you improve…
Server-based solutions are gaining in popularity, in part because the signer doesn't need to carry around a token (the signing credential is stored on an HSM), and also because they can integrate with…
Microsoft has recently announced two major updates regarding their SHA-1 deprecation policy for Code Signing Certificates. The first pertains to the re-issuance of an update for supporting SHA-2 Code…
Paul van Brouwershaven, Technology Solutions Director at GlobalSign led an interactive session at WHD2015 around the current and upcoming changes in the SSL industry. Unfortunately we ran out of time…
Paul van Brouwershaven, Technology Solutions Director at GlobalSign led an interactive session at WHD2015 around the current and upcoming changes in the SSL industry, carrying out a live poll which…