5G Migration: Securing Connected Devices

As we discussed in previous posts, 5G technology is transforming the way the world connects and communicates, and its scale demands increasing reliance on the cloud. Mobile Network Operators (MNOs) are focused on creating enhanced 5G product offerings for their customers, and a huge part of that is the ability to connect more devices, provision […]

Secure 5G: Securing the Cloud with PKI

We recently talked about how PKI can secure 5G networks. An important aspect of securing 5G is the cloud, especially as mobile network operators (MNOs) move from physical deployments to virtual. 5G is not just changing a layer of the network, it’s rebuilding new base stations and antennas. Admins and devices accessing the cloud must […]

Qualify for a VMC – How to Trademark Your Logo

In our past posts, we’ve covered two essential steps to qualify your organization for a VMC certificate: How to get your logo into the correct format How to become DMARC/BIMI compliant This week, we’ll go over another equally critical step: How to check if your brand logo is a registered trademark and apply for a […]

What is the Most Secure Voting Method?

In our last post we explained why elections are not run online — even though it seems most aspects of our lives are online — especially since the pandemic has required innovative solutions for remote life. This article will examine the current voting methods, using the example of the United States as it prepares for […]

Secure 5G: Next Gen Tech Meets Next Gen, Modern PKI

5G has captured the attention of world audiences as the technology promises next-generation speeds and capabilities. And while that technology isn’t currently widely available, some experts predict that 5G will cover 40% of the world by 2024 and 25% of all mobile traffic data. However, to make 5G available and safe, Mobile Network Operators (MNOs) […]

Why Elections are Not 100% Online — Yet

Every democratic nation faces the challenge of determining the best way to administer a vote, and the U.S. elections are often considered the most complicated in the world. As the U.S. prepares for the 2020 presidential election, voters rightfully have a range of questions on their minds, including, how will the pandemic affect the safety […]

Security of Online Learning

How to avoid Zoom class pranks and data breaches, and keep students safe As a majority of schools and universities move to either 100 percent online or hybrid online and in-person learning this fall, security has become even more important. Just as we saw hackers preying on the public’s heightened awareness when the pandemic began […]

A Guide to Multi-Factor Authentication

Today, computers and smart devices are inexpensive enough that we can own many of them: smart phones, laptops, tablets and wearable micro devices. Our work and private lives demand portability. This, along with a trend towards moving enterprise servers into the cloud, makes secure user authentication even more imperative — and tricky. That brings us […]

A Security Solution that Learns Along with IoT Development

The Internet of Things (IoT) has not yet reached maturity, but with all its possibilities, users and manufacturers have enthusiastically acquired and invested in it without properly considering security. We’re still figuring out a lot about the IoT: what we want from it, what level of privacy we are comfortable with, where the legal limits […]