Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
38 Results for 'Internet'
Blog

By Romona James

April 12, 2018

As new technologies and innovative solutions enter the picture, companies are working to modernize existing power infrastructures and deliver secure, reliable and affordable energy to end consumers. One significant driver in this transformation is the Internet of Things (IoT).
Blog

By Ranjeet Khanna

November 15, 2017

As the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.  
Blog

By Ranjeet Khanna

October 18, 2017

If not properly secured, connected cars threaten to expose sensitive consumer information. With data being passed between so many different connected channels, it’s easier than ever for hackers to get their hands on personally identifiable information. It is very difficult to select a public key or a set of public keys that can be trusted for a long period of time. If the wrong public key is used, a website can be bricked until the server header expires. The wrong key could be provided accidentally or by an attacker. As in many cases, a site can be bricked where the administrator knows nothing about HPKP, or it’s been redirected by an attack.
Blog

By Stephen Demone

October 03, 2017

SSL/TLS Certificates are the most common cybersecurity technology in use today. With over one billion websites on the Internet, and the number of SSL/TLS Certificates issued in the millions, the question has been raised as to whether or not the secure links created by SSL/TLS Certificates should be mandatory, and thus free.
Blog

By Ranjeet Khanna

September 25, 2017

The Internet of Things (IoT) demands the need to safeguard data between devices, sensors, and backend platforms connected within an IoT ecosystem.
Blog

By Ranjeet Khanna

August 08, 2017

While consumer IoT has slowed somewhat, the Industrial Internet of Things (IIoT) — which connects industrial equipment in factories — is booming. Per TNW, the size and scale of IIoT will overtake the consumer market as IoT technology permeates the industrial sector. 
Blog

By Bruce Morton

February 06, 2017

Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s identity, and provides integrity by guarantying the software has not been altered since it was signed. Minimum Requirements for Code Signing will increase Internet security by setting a new bar to prevent private keys from being compromised. The requirements will also provide a better mechanism to have code signing certificates revoked limiting the proliferation of malware. The result will benefit application software suppliers, online businesses, and of course, software users globally.
Blog

By Diana Gruhn

December 20, 2016

Cybercriminals are hard at work prying personal information in new and devious ways. Before a bad Santa injects themselves into your holiday gift list, learn how you can avoid the latest Internet scams this holiday season (and every day), and ensure that bad Santa stays off your list. 
Blog

By Stephen Demone

October 18, 2016

The concept of HTTPS and SSL/TLS certificates has gone mainstream, with thousands of times more SSL/TLS certificates on the Internet today than in 1996 leading to the development of new Free SSL companies that offer unpaid SSL/TLS certificates over the past two years. How will this change the Internet as we know it today? 
Blog

By Jason Soroko

October 07, 2016

Just as PKI is the underlying technology that secures the identities and transactions of today, it will help us to securely engage in a world where our lives will rarely leave some form of connected computing environment. Digital businesses will be more connected, more aware and more agile thanks to a secure IoT. 
Page 1 of 4