eInvoicing the EU VAT Directive

eInvoicing the EU VAT Directive

|
22 May 2019 e-Invoicing & the EU VAT Directive What are they, and what impact is there on businesses outside of the EU? Following the EU Commission’s announcement on 18 April 2019, businesses may or may not be aware the e-invoicing Directive came into force. The rationale for stating ‘may ... Read More
The Ultimate in Security-by-Design – Device Identities Embedded in Chips, and Purpose-built for IoT Applications

The Ultimate in Security-by-Design – Device Identities Embedded in Chips, and Purpose-built for IoT Applications

|
13 May 2019 The Ultimate in Security-by-Design – Device Identities Embedded in Chips, and Purpose-built for IoT Applications Security-by-design isn’t a new concept: It’s the idea of addressing security concerns, considerations and best practices as early as possible in the IoT product, application or network development to minimize vulnerabilities downstream ... Read More
Partnering with Xage Security to Deliver Super-Strong Industrial IoT Security

Partnering with Xage Security to Deliver Super-Strong Industrial IoT Security

08 May 2019 Partnering with Xage Security to Deliver Super-Strong Industrial IoT Security GlobalSign’s IoT solutions group is well known for securing device identities in industrial IoT (IIoT) ecosystems. Xage Security has developed a distributed IIoT security infrastructure.  So, when it came to integrating the best in CA-backed, PKI-based device ... Read More
World Password Day: Is it Safe?

World Password Day: Is it Safe?

02 May 2019 World Password Day: Is it Safe? In the movie “Marathon Man”, Dustin Hoffman’s character is subjected to an extremely painful, brutal line of questioning. Led by a “qualified dentist,” this over-the-top drilling procedure is intended to extract his secrets – and always preceded by the same phrase, ... Read More
Young and Scale-free

Young and Scale-free

|
25 Apr 2019 Young and Scale-free Willow Noonan, Head of R&D and IP Development, IoT at GlobalSign discusses the value and scale in Bitcoin and the Lightning Network. The following is a reproduction of his original article posted on Medium. 1. Foundations and Blockchains Shanghai Tower [1], [2] At 2,073 feet, the Shanghai Tower ... Read More
Bringing Gamification to Cyber Security Training

Bringing Gamification to Cyber Security Training

|
18 Apr 2019 Bringing Gamification to Cyber Security Training Here’s something to think about: According to current research, human error is one of the top three causes of data breaches – preceded only by malicious or criminal attacks. While the majority of employees don’t set out to cause harm, many ... Read More
It's Tax Season - And Cyber Criminals are Waiting

It’s Tax Season – And Cyber Criminals are Waiting

|
10 Apr 2019 It’s Tax Season – And Cyber Criminals are Waiting Taxpayers and Accountants Must Stay Vigilant to Protect Sensitive Information At GlobalSign, everything we do is focused on one thing – protecting identities. So when tax season rolls around next week (April 15), we’re acutely aware how fraud ... Read More
Don’t be Fooled: The Top 6 Cybersecurity Risks

Don’t be Fooled: The Top 6 Cybersecurity Risks

|
03 Apr 2019 Don’t be Fooled: The Top 6 Cybersecurity Risks We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?” Once upon a time, a man named Victor Lustig notoriously sold a “money printer” for tens ... Read More
Loading...