July 24, 2014
This blog includes a few questions and answers we didn't have a chance to cover in our recent digital signature webinar, including what does a recipient need to receive a signed document and who…
July 08, 2014
I'm going to walk through the simple steps it takes to apply a digital signature using one of the industry's leading PDF editing, markup, and collaboration software, BlueBeam Revu.
June 11, 2014
Security of a website and its infrastructure play a very important role in the trustworthiness of a site. The 2014 OTA Honor Roll helps promote SSL best practices.
June 06, 2014
OpenSSL published a security advisory highlighting six new vulnerabilities with fixes available.
June 03, 2014
Learn how an insurance firm wanted to switch from paper-based workflow to an electronic workflow to reduce the turnaround time for policy application and delivery!
May 15, 2014
While the OpenSSL code may be freely available, the foundation needs developers, tools, QA and oversight to produce the best code – and that carries a cost, just as it does for the rest of us.
April 28, 2014
There are a lot of authentication solutions available, so to help you decide which is the best fit for you, we've created a list of considerations based on our conversations with customers like you.
April 24, 2014
IT industry trends in 2014 - Increase in demand for online security, focus on customer education and internal network security.
April 22, 2014
To help you decide if certificate-based authentication is right for you, we've listed some of their key benefits.
April 16, 2014
One of the biggest risks from the Heartbleed bug was the risk of username/password leaks. This blog explores how multi-factor authentication could have helped mitigate the risk.
April 11, 2014
Your IT department may be scrambling to replace any and all certificates that were potentially compromised by the Heartbleed bug. Here are 3 things you should know when reissuing certificates: 1. All…
April 09, 2014
Digital Signatures are a tried and true alternative to wet ink signatures. Let’s take a closer look at some of the reasons you should consider using them in place of wet ink signatures.
April 08, 2014
The Heartbleed vulnerability is something OpenSSL users should take very seriously as it enables an adversary to obtain data from portions of the web server memory.
March 31, 2014
Read this blog for everything you need to know about how to upgrade to SHA-256 before SHA-1 is depreciated.
September 10, 2013
Just like you, over the past months, we have been watching the coverage on the Edward Snowden leaks. Each leak has provided unprecedented insights into both the capabilities and practices used by the…
- November 30, 2022
- Michelle Davidson
Through new standards and proposed legislation we will see connected devices become more secure and resilient to cybercrime. Learn more
- December 09, 2022
- Amy Krigman
Apple introduces advanced data protection for iCloud, Chinese hackers stole U.S. COVID relief funds, Rackspace was hit by a ransomware attack and…