July 2011 - Entrust, Inc. 1-10 of 11
What Are the Best Methods of Simplifying SSL Certificate Management?
This is the first entry in a five-part series that focuses specifically on SSL certificate management. Throughout the series, we’ll focus on the most popular challenges we hear from customers. When the series is completed, this post will be used as an index to all other related blogs entries.
No such thing as a free lunch… particularly when dealing with a security breach.
As most of you are well aware, as a remedy to try and help its customers, RSA is offering “free” tokens to replace their compromised devices. Well, they’re really not free tokens; what RSA is willing to do is provide a new token with a limited-time license based on the remaining life span of a customer’s compromised [Read More...]
Are you into BYOD?
Today’s identities go well beyond people and how we traditionally think of identities. The number of people identities will be dwarfed in the next five years by device and application identities. How is your organization planning on dealing with the consumerization of the IT infrastructure?
Entrust Webcast: Leveraging Mobile Devices for Strong Authentication
Security-conscious organizations and enterprises are finding it increasingly difficult to secure various mobile devices that flood corporate networks. With handheld devices heavily leveraged to access corporate networks and sensitive information, CIOs must consider their authentication strategies for any number of evolving channels.
What is Code Signing?
From Wikipedia, “Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash.” In order to sign the code, the publisher needs to generate a private-public key pair and [Read More...]
Letter to Compliance Week Editor Regarding Data Breach at Security Firm Could Make Others Vulnerable Article
Blogmaster Note: This is a letter to the editor of Compliance Week in reference to its article titled “Data Breach at Security Firm Could Make Others Vulnerable” written for the site by Karen Kroll on June 21. To the Editor: Earlier this month, I was interviewed by your reporter, Karen Kroll for the June 21 [Read More...]
RSA got you down, Maybe it’s time to Trade Up!
As we all have seen in the media, as well as heard from our customers, cyberthreats are an escalating problem for enterprises, financial institutions, governments and even individuals. These threats are as basic or as sophisticated as necessary to perpetrate the desired outcome of those doing the attacks.
The Time is Now
Today, Entrust announced a hard token replacement program for organizations switching to Entrust IdentityGuard
What’s on CISO’s minds?
A few weeks ago, I attended an InfoSec conference in Brussels, Belgium - "Enterprise Security Exchange". Overall, it was a great conference, as I was able to have great discussions with CISO’s of many known and respected global organizations.
Diving into the FFIEC Guidance & What the Future will Undoubtedly Hold
Last week, the FFIEC issued a new supplement to the 2005 “Authentication in an Internet Banking Environment Guidance.” Congratulations to the FFIEC on a well needed update to say the least — especially considering the incredible advances made in the online criminal community over the past few years and the associated breaches and fraud attacks [Read More...]