Author: John Grimm

Categories : Data Security            Leave a comment           

Gartner predicts that, as organizations everywhere undergo a form of digital transformation, with many looking to make savings on their IT budgets, the global public cloud services market will grow by more than 17 percent by the end of this year. As a result of this increasing adoption, nearly two thirds of organizations around the world (62%) are now using public key infrastructure (PKI) credentials to support their public cloud-based applications and services – up 12 percent over last year, […]

Categories : Data Security            Leave a comment           

Building and maintaining trust with customers, stakeholders and the wider community is an integral part of any successful business. Yet, in today’s cyber-attack era – with attackers developing more advanced techniques every day – sustaining that trust has never been more of a challenge. It is for this very reason that many organizations by necessity are “upping their game” to safeguard data and protect themselves, and ultimately their customers, from cyber-attackers. As an example, an organization with a critical role […]

Categories : Data Security            Leave a comment           

Every day, our digital world is becoming more and more dependent on public key infrastructure (PKI). The need to create unique credentials that validate the identity of any person, device or service has never been more important. With the ever-present threat of cyberattacks, malicious insiders, or even employee mistakes, the role of digital credentials to control how sensitive data is accessed within an organization has reached new levels of criticality. Click to Tweet: Global Trends in #PKI: 37% of orgs […]

Categories : Data Security            Leave a comment           

We live in a world where the methods used to prove one’s identity can take many different forms – as simple (and weak) as a password, as complex as a biometric, or simply showing your driver’s license.  When it comes to proving the identity of a device that a human is using or is responsible for, the means that are available for authentication depend on the capabilities of the device.  And we’re quickly entering an era where the number and […]