Insights and Outlooks from the Digital Identity Market Leader

Oct 26, 2018 10:45:13 AM
This article originally appeared in Healthcare Analytics News. Click the link below for the full version. The U.S. Food and Drug Administration’s recently released guidelines on medical device security serve as a framework for hea [...]
Oct 24, 2018 11:00:19 PM
Without always thinking about it, patients willingly share Personally Identifiable Information (PII) destined to live in electronic health records (EHRs) with their trusted healthcare providers. Maintaining this data is an immense [...]
Oct 5, 2018 9:51:51 AM
  As the Internet of Things (IoT) continues to grow and expand into new industries, there remains a gap between device manufacturing and security. Security is often an afterthought, and viewed as something that can be added to the [...]
Oct 5, 2018 9:48:16 AM
With cyber crime damage costs estimated to hit $6 trillion annually by 2021, there’s no doubt that cybersecurity continues to be one of the top concerns for IT departments in every industry. They’re constantly in search of more ro [...]
Sep 21, 2018 12:10:20 PM
Companies of every size have been tending to digital security for decades. What at one time may have been thought of as comprehensive coverage, is now just enough to keep the lights on. As the number of connected people, applicati [...]
Aug 17, 2018 1:15:41 PM
Public Key Infrastructure (PKI) supports digital certificates and their associated keys to verify the identity of users and devices to other users, devices and applications. As such, PKI is paramount to network and Internet securi [...]
Aug 13, 2018 4:05:25 PM
There are many benefits to the automation of container deployment, but these benefits do not come without their complications. The DevOps efforts have made hard coding credentials into cloud-init scripts common practice, but this [...]
Aug 13, 2018 3:42:07 PM
Clients commonly ask us how to use our PKI and digital certificate operations management platform, CMS, to manage application certificates in a DevOps environment. They are “containerizing” their applications with Docker and want [...]
Aug 6, 2018 3:20:50 PM
 In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types [...]
Jul 30, 2018 9:49:15 AM
Something is wrong in the broader Enterprise cyber security landscape. As a whole, organizations are devoting growing sums of cash to thwart cyber criminals. In 2018, international cyber security spending could reach $96 billion, [...]