IoT devices ransomware

Securing IoT Devices in a World of Complexity

The IoT has come of age, and its momentum shows no signs of slowing. IDC predicts by 2025 there will be 41.6 billion IoT devices connected to businesses, and these “things” will ...
Security Boulevard
Digital Identities and Assets - David Mahdi, Sectigo

Techstrong TV: Understanding & Managing Digital Identities

David and Charlene discuss how to effectively manage digital identities and assets in the rapidly evolving digital world. The video and a transcript of the conversation are below. This is Digital Anarchist ...
Security Boulevard
IoT Security with Identity Management Solution

Why is IoT Security so Important Today?

Digitally connected devices and applications are encroaching every aspect of our lives, be it our homes, offices, cars or even our bodies. All objects are turning smart to be able to harness ...
Mobile Security: An Often Overlooked Area in Your Business

Mobile Security: An Often Overlooked Area in Your Business

With the advent of advanced smartphones, our communities and businesses have become more mobile than ever before in the last decade. The ease of operations along with instant access to the resources ...
Machine Identity Lies at the Core of Cybersecurity

Machine Identity Lies at the Core of Cybersecurity

In today’s world, attaining simplicity is the most difficult job. With each passing day, our lives are becoming more complex. Most of our experiences like shopping, working, reading, etc. are getting digitalized ...
Why is Machine Identity as important as Human Identity

Why is Machine Identity as important as Human Identity?

Communication is an elemental fabric of a society that keeps it running. There’s a constant exchange of information, commodities or services happening between individuals for various purposes. For any communication to occur, ...
Building Digital Trust with Machine Identity Management

Building Digital Trust with Machine Identity Management

While digital transformation has been underway for many years now, the outbreak of the COVID-19 pandemic made it an overnight business necessity. As organizations were forced to move their operations and workforces ...
CLM as a Service

CLM as a Service: A Brief Summary

Anything that is valuable needs to be secured. This has been the principle since times immemorial. In ancient times crops needed to be secured from external attackers. Then the need of security ...
How a single digital certificate expiry impacted 11 countries

How a Single Digital Certificate Expiry Impacted 11 Countries?

It was early December 6th 2018, a cold winter morning when the security team at Swedish multinational networking and telecommunications company Ericsson received the jolt of their lives. A digital certificate used ...
The Missing Piece in the Zero Trust Model

The Missing Piece in the Zero Trust Model

With rapid adoption of cloud, IoT and DevOps automation, the traditional approach of trusting devices within a network perimeter is no longer applicable. There is a growing need for a new model ...