- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![eIDAS – breaking the grip from ink and paper](/sites/default/files/content/blog/field_image/2020-03/matrix_515.jpg)
Much has already been written on eIDAS, the new EU regulation on electronic identification and trust services; that it holds the promise of a safer and more integrated digital…
Read More![Vormetric Live Data Transformation – Boldly Going Where No Encryption Has Gone Before](/sites/default/files/content/blog/field_image/2020-03/matrix_516.jpg)
Downtime. Nobody likes it. Unplanned downtime is almost always expensive. A 2015…
Read More![Identity in the Time of Digitalization](/sites/default/files/content/blog/field_image/2020-03/matrix_517.jpg)
Electronic Signature and Multifactor Authentication We are entering a new digital world in which the way we perceive and protect identity is rapidly shifting. As a…
Read More![New Innovations for the New Year, Part One: The Short Term](/sites/default/files/content/blog/field_image/2020-03/matrix_518.jpg)
This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then,…
Read More![How governments around the globe are tackling cyber-security](/sites/default/files/content/blog/field_image/2020-03/matrix_519.jpg)
Every country has secrets. Every government has data or information that it simply cannot afford to lose or have stolen. Whether it’s strategic military positioning, government…
Read More![](/sites/default/files/default_images/matrix.jpg)
If you are already developing on Docker, you already know why interest is so high. The combination of faster application delivery and evolution that it makes possible, easily…
Read More