Skip to content

encryption

The PKI Guy talks security with Dr. Thorsten Groetker of Utimaco

Q&A with Dr. Thorsten Groetker, chief technology officer, Utimaco TPG: What are enterprises’ top security concerns? TG: Large enterprises have security concerns on many different layers; from secure single sign-on solutions for individual users to security in the cloud. Often, all those challenges must be addressed with an eye on regulatory requirements. How to maintain…

Read More

SHAKEN/STIR is Getting Real

The Federal Communications Commission (FCC) estimates robocalls will constitute more than half of all phone calls placed in the U.S. this year. In an effort to end to this, the FCC and major telecommunications companies including Comcast, AT&T, and T-Mobile have lined up behind a new standard called SHAKEN/STIR (Signature-based Handling of Asserted Information using…

Read More

The PKI Guy talks authentication with author Ivan Ristic

Q&A with Ivan Ristic, author of Bulletproof SSL and TLS and founder of Hardenize TPG: Tell us about your book, Bulletproof SSL and TLS. What are the biggest takeaways for IT security professionals? IR: Bulletproof SSL and TLS came out of my frustrations with the complexities of the TLS and PKI ecosystem and especially the…

Read More

The PKI Guy explores IoT security with Doug Beattie of GlobalSign

Q&A with Doug Beattie, vice president of product management, GlobalSign TPG: Tell us about your scalable encryption. DB: GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery, and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers,…

Read More

The PKI Guy talks enterprise security with Ryan Smith of Futurex

Q&A with Ryan Smith, vice president, global business development, Futurex TPG: Tell us about your cryptographic solutions. RS: Futurex is a global manufacturer of FIPS 140-2 Level 3 and PCI HSM validated hardware security modules and enterprise security applications. At a high level, our focus is on three areas: cryptographic processing, key and certificate management,…

Read More
Scroll To Top