Insights and Outlooks from the Digital Identity Market Leader

Keyfactor Technical Team

Keyfactor Technical Team

Recent Posts

Nov 19, 2018 3:49:33 PM
Since the beginning of the company, caring passionately about our service promise to our clients had been a hallmark of Certified Security Solutions (CSS) -- that's a big part of what made us successful for more than 15 years, sec [...]
Oct 24, 2018 11:00:19 PM
Without always thinking about it, patients willingly share Personally Identifiable Information (PII) destined to live in electronic health records (EHRs) with their trusted healthcare providers. Maintaining this data is an immense [...]
Oct 5, 2018 9:51:51 AM
  As the Internet of Things (IoT) continues to grow and expand into new industries, there remains a gap between device manufacturing and security. Security is often an afterthought, and viewed as something that can be added to the [...]
Oct 5, 2018 9:48:16 AM
With cyber crime damage costs estimated to hit $6 trillion annually by 2021, there’s no doubt that cybersecurity continues to be one of the top concerns for IT departments in every industry. They’re constantly in search of more ro [...]
Aug 6, 2018 3:20:50 PM
 In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types [...]
Jul 30, 2018 9:49:15 AM
Something is wrong in the broader Enterprise cyber security landscape. As a whole, organizations are devoting growing sums of cash to thwart cyber criminals. In 2018, international cyber security spending could reach $96 billion, [...]
Jun 14, 2018 3:17:40 PM
There are clear parallels between home ownership and cyber security. Locked windows and doors as well as household alarms have cyber-analogs, of course, and are often used to help illustrate the importance of technologies such as [...]
Jun 4, 2018 3:42:44 PM
Gambling means being prepared to lose everything. When working with an out of control, unmanaged digital certificate count and public key infrastructure (PKI), the risks of facing issues with financial and productivity losses are [...]
May 8, 2018 11:17:54 AM
Of all of the connected devices blackhat hackers could go after, why would they target medical devices? While there are a plethora of motives, most involve financial gain. Cybercriminals targeting medical devices are willing to pu [...]
Apr 6, 2018 11:33:57 AM
The demand for trust in today's uber-connected digital society is unprecedented. Consumers of software require guaranteed proof that the application they are using is legitimate. Secure code signing validates the author of the sof [...]