April 2013 - Entrust, Inc. 1-8 of 8
Malvertising and Other Online Mischief
Malvertising — or malicious advertising — is getting a bit more attention as of late. In essence, it’s just another method by which criminals attempt to infect user PCs with some form of malware — albeit a very scary form as it can reach so many users so easily. The important point is that criminals [Read More...]
AP Twitter Hack Sends Stock Market into Plunge
The AP Twitter hack lead to a sudden drop in the Dow Jones Industrial Average after the perpetrators sent out a tweet about an attack on the White House
Facebook vs. Salesforce Battle for Enterprise Identity or Straight Consumerization?
I recently read an interesting article by Ericka Chickowski, “Facebook vs. Salesforce: An Identity Smackdown?” at Dark Reading.
GRC has created HTTPS/SSL Fingerprints. This service allows you to check whether or not your enterprise is performing MITM on the SSL secured site that you are trying to reach. It compares the certificate fingerprint to what you would receive to the fingerprint that they receive by going direct. If they are the same, the certificate is authentic and you have no problem. If they are different, then it is likely that someone is performing MITM on your SSL connection.
Bill Conner, KRLD’s David Johnson Discuss Threats, Going Private & Government’s Involvement in Private Security
Entrust President and CEO Bill Conner went to the airwaves to chat with David Johnson, of KRLD AM 1080, for a CEO Spotlight segment. Their discussion focused on three primary topics: the changing threat landscape, risks and challenges of going private and government involvement in private-sector cybersecurity.
What Do You Want from Mobile?
Building on an already robust suite of mobile solutions , Entrust just announced version 2.0 of our Mobile Smart Credential. This new release includes a few very cool features that help organizations deploy stronger, more effective security controls and improve the end-user experience. This makes security that is simple rather than a frustrating barrier that gets in the way of business.
Self-Signed Certificates don’t deliver Trust
We’ve heard the argument that website operators could just use self-sign certificates. They are easy to issue and they are “free.” Before issuing self-signed certificates, it’s a good idea to examine the trust and security model. You should also compare self-signed certificates to the publicly trusted certification authority (CA) model; and then make your own decision.
Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.