- November 22, 2023
- Sarah Topping
DevOps Teams Need to Reprioritize Security - Here’s How
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
Let’s take a look at some of the key reasons why IT teams should implement automation within their organization.
In this article, we look at how digital identity verification plays a key role in the eIDAS 2.0 regulation.
OpenSSL published a security advisory highlighting six new vulnerabilities with fixes available.
Learn how an insurance firm wanted to switch from paper-based workflow to an electronic workflow to reduce the turnaround time for policy application and delivery!
While the OpenSSL code may be freely available, the foundation needs developers, tools, QA and oversight to produce the best code – and that carries a cost, just as it does for the rest of us.
There are a lot of authentication solutions available, so to help you decide which is the best fit for you, we've created a list of considerations based on our conversations with customers like you.
IT industry trends in 2014 - Increase in demand for online security, focus on customer education and internal network security.
To help you decide if certificate-based authentication is right for you, we've listed some of their key benefits.
One of the biggest risks from the Heartbleed bug was the risk of username/password leaks. This blog explores how multi-factor authentication could have helped mitigate the risk.
Your IT department may be scrambling to replace any and all certificates that were potentially compromised by the Heartbleed bug. Here are 3 things you should know when reissuing certificates: 1. All…
Digital Signatures are a tried and true alternative to wet ink signatures. Let’s take a closer look at some of the reasons you should consider using them in place of wet ink signatures.
The Heartbleed vulnerability is something OpenSSL users should take very seriously as it enables an adversary to obtain data from portions of the web server memory.
Read this blog for everything you need to know about how to upgrade to SHA-256 before SHA-1 is depreciated.
Just like you, over the past months, we have been watching the coverage on the Edward Snowden leaks. Each leak has provided unprecedented insights into both the capabilities and practices used by the…