About

Matthew Lewis, Entrust’s social media and analyst relations specialist, brings a unique perspective from daily interactions with industry experts, bloggers, social media influencers and more. He’s core to Entrust’s mission to remain innovative in a dynamic security landscape, which includes changes involving vendors, threats, information security/information technology (IS/IT), operational technologies ecosystem (e.g., architectures, interoperability, standards), industry groups and governing bodies. Matthew also manages and monitors Entrust’s brand across the social space, ensuring the company’s expertise, customer relationships and core messages all garner a greater share of voice.

Blog Posts 1-9 of 9

Cybersecurity and Pareto Optimality? (Part 2)

April 24, 2014 by Matthew Lewis     No Comments
This entry is part 2 of 2 in the series Cybersecurity and Pareto Optimality

This entry is part 2 of 2 in the series Cybersecurity and Pareto OptimalityIn my previous post, I discussed cybersecurity, primarily from the defensive point of view, and provided a simplistic explanation of Pareto Optimality.   Defense isn’t the only side at play. However, we tend to think in terms of defense, which leans toward [Read More...]

Filed Under:
Tagged With:

Cybersecurity and Pareto Optimality? (Part 1)

April 10, 2014 by Matthew Lewis     No Comments
This entry is part 1 of 2 in the series Cybersecurity and Pareto Optimality

This entry is part 1 of 2 in the series Cybersecurity and Pareto OptimalityIn the study of economics there is a technique called Pareto optimality. Pareto Optimality, or Pareto Efficiency, is a guiding force of economic efficiency. Simply put, it is the principle that there exists a balancing point between opposing interests where neither party [Read More...]

Filed Under:
Tagged With:

Digital Certificates on Your Phone?

September 9, 2013 by Matthew Lewis     No Comments

It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013. But there is also the myth that certificate-based identities [Read More...]

Twitter Login Verification Announced

May 23, 2013 by Matthew Lewis     No Comments

In case you hadn’t seen the news, Twitter login verification was announced yesterday. While I certainly don’t want to praise Twitter for implementing second-factor authentication login long after they knew a problem existed, it does remain a solid step in the right direction.

Inside a Twitter Attack: How Hijacked Twitter Accounts are Falling Victim to Digital Theft, Influencing Global Markets

May 2, 2013 by Matthew Lewis     No Comments

Recently, we have seen a rash of high-profile takeover attacks on Twitter accounts. These Twitter attacks are targeting Western news organizations, but some organizations outside of the news realm (e.g., Burger King) have also come under attack.

Bill Conner, KRLD’s David Johnson Discuss Threats, Going Private & Government’s Involvement in Private Security

April 10, 2013 by Matthew Lewis     No Comments

Entrust President and CEO Bill Conner went to the airwaves to chat with David Johnson, of KRLD AM 1080, for a CEO Spotlight segment. Their discussion focused on three primary topics: the changing threat landscape, risks and challenges of going private and government involvement in private-sector cybersecurity.

Mobile and Security – No Longer Mutually Exclusive

April 2, 2013 by Matthew Lewis     No Comments

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.

A Few Thoughts After the Gartner Identity and Access Management Summit

December 14, 2012 by Matthew Lewis     No Comments

Last week, I attended the Gartner Identity and Access Management Summit in Las Vegas with Entrust product manager Dave Mahdi.

“Can I skip the line? I have an ePassport!”

September 21, 2011 by Matthew Lewis     No Comments

During ICAO’s 7th symposium, held in Montreal Sept. 12-15, Entrust’s Dave Mahdi and Craig Delmage spoke about ePassports and border control during feature presentations. One common theme: border agents using mobile devices as ePassport readers. Everyone in technology is familiar with