Insights and Outlooks from the Digital Identity Market Leader

Jul 1, 2020 9:02:23 AM
An X.509 certificate is a vital safeguard against malicious network impersonators. Without x.509 server authentication, man-in-the-middle attacks can be initiated by malicious access points, compromised routers, etc.  
Jun 29, 2020 2:32:13 PM
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed.
Jun 19, 2020 10:52:40 AM
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems.  The result: 25,000 fraudulent charges valued at 56 millio [...]
Jun 18, 2020 11:55:09 AM
Public Key Infrastructure (PKI) governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.
Jun 17, 2020 2:04:12 PM
Most people today are familiar with the basic idea of cryptography -- encrypting a message to secure it so that it’s not readable to anyone and everyone.
Jun 15, 2020 12:14:40 PM
No one is denying the need for high levels of security in today’s enterprise. Security has been a top priority for a long time and will continue to remain one for the foreseeable future. 
Jun 12, 2020 3:02:22 PM
Enterprises today run on applications, but keeping those applications up and running is a constant challenge, not to mention the task of securing them.  
Jun 9, 2020 3:24:04 PM
This article is for anyone who seeks a better understanding of SSL certificates, and how they provide security for both Public Internet and Enterprise Intranet connections. 
Jun 9, 2020 12:18:28 PM
When it comes to preparing your security for life’s unexpected circumstances—whether it’s a breach, failed audit, or a global pandemic forcing your business to figure out how to scale PKI remotely—some situations may seem easier t [...]
Jun 8, 2020 9:38:58 AM
The world of IoT has continued to rapidly expand, and as product innovators bring connected devices to market, the risk of device hacks and data theft continue to rise. Faster product development and feature delivery often take pr [...]