August 2010 - Entrust, Inc. 1-8 of 8

Chain Certificates

August 31, 2010 by Bruce Morton
What are chain certificates? Chain certificates are referred to by many names — CA certificates, subordinate CA certificates or intermediate certificates.  Confused yet? Let’s break it down. It all starts with something called a root certificate. The root certificate is generated by a certification authority (CA) and is embedded into software applications. You will find [Read More...]

Law Enforcement Authentication – Keep Safe Out There

August 25, 2010 by Karen Platt
Entrust met on August 24th with a number of representatives of Southern California police forces to discuss strong authentication for law enforcement. While most policing agencies already have some form of access control in place, a number of factors are causing these systems to be reexamined. Budget Squeeze It’s no secret that the slow economy [Read More...]

Powerful Servers Need Powerful Certificates

August 24, 2010 by Scott Shetler
With our Entrust Certificate Services release yesterday, we made significant improvements in the way we offer multi-domain (or multi-SAN) certificates. Why is this significant to our customers? Back in 2007, with Microsoft adding new features such as AutoDiscovery to Exchange Server, the number of services each server needed to protect with SSL encryption started increasing. [Read More...]

Black Hat and DEF CON Follow-up

August 20, 2010 by Bruce Morton
Here is a follow-up to my earlier post SSL Security Silly Season.  Black Hat USA 2010 and DEF CON 18 conferences held at the end of July had three presentations that addressed SSL issues. Here is a quick summary and where you can get more information. Internet SSL Survey 2010 by Ivan Ristic In this [Read More...]

The Importance of Key Backup!

August 16, 2010 by Scott Shetler
On Tuesday, Aug 17th, Entrust is releasing a new version of it’s certificate management service, and included in that version among other things are new secure email certificates! We have 2 flavors launching: one for individuals that offers a low assurance ID with limited bells and whistles, and one for enterprises that offers a medium [Read More...]

State of the Union

August 11, 2010 by Scott Perry
I’ve been working in the authentication and fraud detection space for close to ten years now and I find it both fascinating and scary. And the more knowledgeable I get, or maybe just the more I read about it, the scarier it gets.   At our recent sales conference we had a number of speakers who [Read More...]

Quality vs. Quantity: SSL Certificate Verification Practices

August 9, 2010 by Bruce Morton
VeriSign announced that GeoTrust (a VeriSign subsidiary) SSL certificates are most often used to secure the most-visited web sites. This was established by cross-referencing the Alexa 1 Million with the July 2010 Netcraft SSL survey. The results revealed 35,142 unique domains protected by GeoTrust SSL certificates out of approximately 165,000 of the Alexa 1 Million [Read More...]

Why Adobe CDS Certificates

August 4, 2010 by Scott Shetler
Back in 2005, Adobe unveiled the Certified Document Services (CDS) program, which automatically trusts new digital IDs that are chained to (part of the family of) the Adobe Root certificate embedded in Adobe products. Anybody who opens a PDF document signed or certified by a CDS credential automatically gets a “blue ribbon” with trust provided to [Read More...]