The Mystery of PKI for Mobile
Posted on 26 July 2017 by
We explain how PKI technology can form part of a successful cyber security strategy.
Posted on 26 July 2017 by
We explain how PKI technology can form part of a successful cyber security strategy.
Posted on 21 December 2016 by
7 years ago, I started my first IoT project for Gemalto. Here are 5 lessons I learned from this adventure.
Posted on 20 June 2013 by
The United States social security card dates back to 1936 and it hasn’t changed much since then. A small piece of paper the size of a ticket stub holds one’s social security number that is an American’s life line for identity verification, employment eligibility, and citizenry. The paper card is not quite up to date […]
Posted on 16 April 2013 by
Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]
Posted on 03 July 2012 by
Terrorists. Organized crime and drug cartel kingpins. Fraudsters. Serial killers. Sex offenders. Name a criminal and there is one place you can find them all—the US Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). After the 9/11 commission showed that terror attacks on the World Trade Center might have been prevented by better communication, […]
Posted on 14 March 2012 by
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like […]