Authentication

The PKI Guy explores IoT security with Doug Beattie of GlobalSign

Q&A with Doug Beattie, vice president of product management, GlobalSign TPG: Tell us about your scalable encryption. DB: GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery, and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers,…

Read More

The Evolving Sense of Trust in the Age of Cryptocurrency

With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…

Read More

Stay Safer Online With Two-Factor Authentication

According to Pew Research Center, 84 percent of adults rely primarily on memorization or pen and paper to store passwords. But we know that storing passwords on paper could lead to exposure. Instead, using a complex password, combined with password management, and two-factor or multi-factor authentication can help greatly reduce risks. Especially with phishing on…

Read More

Creating a NDES Policy Module – A Programmers Guide

Microsoft introduced a great security improvement in Windows Server 2012 R2 to alter the standard Network Device Enrollment Service (NDES) security process. If you are familiar with the whitepaper I wrote for Microsoft (Securing and Hardening NDES) you’ll know I wrote about the disadvantages of using NDES for BYOD and Internet accessible enrollment solutions. The…

Read More