Entrust Identity On: Latest Posts
This entry is part 2 of 2 in the series Cybersecurity and Pareto OptimalityIn my previous post, I discussed cybersecurity, primarily from the defensive point of view, and provided a simplistic explanation of Pareto Optimality. Defense isn’t the only side at play. However, we tend to think in terms of defense, which leans toward [Read More...]
I am privileged to speak with a lot of organizations that are architecting their security infrastructure. Some of them have purchased a security point solution and honestly believe that they are now “secure.” If you spend time walking through the vendor halls at security conferences you will get a good sense for the sheer [Read More...]
What’s next for Entrust? Entrust president David Wagner sat down with IT Harvest’s Richard Stiennon at RSA Conference 2014 to discuss Entrust’s past, present and future role in security technology, and the state of the industry as a whole. Datacard Group Acquisition of Entrust After being acquired by Datacard Group in December 2013, integration of [Read More...]
A man said he carried out a breach on the University of Maryland to expose a bigger problem.
From the Target breach last year to the crop of new data attacks that have arisen in 2014, there are no shortage of threats to enterprise security on the web.
It’s encouraging that many organizations have become aware of security of their networks and computer resources. This awareness is sometimes triggered by breach or fraud headlines in tech journalism, which leads to concern and curiosity. It is immediately apparent when I’m speaking with a company that has suffered from an attack because their questions are [Read More...]
With news of the Heartbleed bug, we have been receiving questions as to how this impacts the certification authority (CA) service at Entrust. In summary, Entrust SSL customers do not need to be concerned about the management of their certificates or their certificate management accounts. The CA private keys are protected on a NIST FIPS [Read More...]
A quick look at our world today reveals that the need for mobile security has never been greater. After all, the number of activated mobile devices has actually surpassed the population of our planet. For the people who use them — which is just about everybody — such devices permeate every aspect of life. These [Read More...]
Malware is a problem across the board, but identity protection measures can help fight it.
The discovery of the Heartbleed implementation bug that could attack certain version of OpenSSL has, rightfully, made global headlines. While this vulnerability doesn’t affect the certificates issued by trusted certification authorities (CA), the discovery has set end-users into a bit of “password panic.” The crux of the issue is that services providers, website operators, software [Read More...]