5G Migration: Securing Connected Devices

As we discussed in previous posts, 5G technology is transforming the way the world connects and communicates, and its scale demands increasing reliance on the cloud. Mobile Network Operators (MNOs) are focused on creating enhanced 5G product offerings for their customers, and a huge part of that is the ability to connect more devices, provision […]

Secure 5G: Next Gen Tech Meets Next Gen, Modern PKI

5G has captured the attention of world audiences as the technology promises next-generation speeds and capabilities. And while that technology isn’t currently widely available, some experts predict that 5G will cover 40% of the world by 2024 and 25% of all mobile traffic data. However, to make 5G available and safe, Mobile Network Operators (MNOs) […]

How to Set Up DMARC to Qualify Your Domain for VMC

In our last post, we discussed how to get your brand logo into the correct format for BIMI/VMC. This post will tackle the next step: how to set up DMARC for your organization. What is DMARC? DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication, policy and reporting protocol that allows organizations to […]

Remote Secure Mobile Device Management

Remote Mobile Device Management (MDM) solutions help companies manage and secure connected devices for remote workers Today’s organizations face new challenges maintaining security and identity. New changes in the current environment have led to an increase in remote work and more bring your own device (BYOD) where they may not have existed before. In this […]

This Month in SSL: November 2015

Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption News Microsoft is reconsidering when they will deprecate support for SHA-1 Certificates due to research about increasing risks associated with using this hash. This blog post discusses deprecating the algorithm as early […]