Entrust Identity On: Latest Posts

To the Cloud: Entrust Takes to the Sky to Simplify Cloud Identity Management

April 8, 2014 by Entrust, Inc. Leave a Comment

Are you a CISO, IT manager, administrator or even a non-technology manager tasked with security-related objectives outside of your scope? Entrust is here to help make your job easier. No matter what type of Entrust security solution you and your organization currently trusts — SSL, device certificates, certificate management and discovery, smart credentialing or even [Read More...]

Filed Under: Cloud Security Tagged:

U.S. University Moves Trust to the Cloud After Data Breach

April 4, 2014 by Entrust, Inc. 2 Comments

A move to the cloud provided better security for one university.

Do You Need SHA-2 Signed Root Certificates?

April 4, 2014 by Bruce Morton Leave a Comment

We have discussed the SHA-1 deprecation policy and why you should move to SHA-2. The certification authorities (CAs) have provided methods to have your certificates issued and signed using a SHA-2 hashing algorithm. As we move ahead, you will see the CAs changing the default signing algorithm from SHA-1 to SHA-2. It’d be sound strategy [Read More...]

Cybercrime: Compromising Identity, Reaping Profits, and Not Slowing Down (Part 2)

April 3, 2014 by Entrust, Inc. Leave a Comment

Cybercrime works like any other criminal enterprise. And to protect against criminals, users must defend themselves.

Filed Under: Authentication Tagged:

SSL Review: March 2014, part 2

April 2, 2014 by Bruce Morton Leave a Comment

Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: 2014 – Looking Back, Moving Forward Elliptic-Curve Cryptography, Simplified Who will Control ICANN? Your Audit Report has Expired CA Security Council discussed: Think Twice Before [Read More...]

Filed Under: SSL Tagged: certificate transparency, SSL, SSL Review

Entrust President Addresses U.S. Senate Subcommittee about Recent Malware Attacks

April 2, 2014 by Entrust, Inc. Leave a Comment

David Wagner explained that the Target debacle doesn’t have to happen to the well-guarded company.

Filed Under: Authentication Tagged: Wagner

Cybercrime: Compromising Identity, Reaping Profits, and Not Slowing Down (Part 1)

April 1, 2014 by Entrust, Inc. 1 Comment

Malware poses a continued and ever-strengthening threat. But users can guard themselves against attack.

Filed Under: Authentication Tagged:

Weakly Guarded Businesses Can Expect Decline in Revenue (Part 1)

April 1, 2014 by Entrust, Inc. Leave a Comment

Businesses that aren’t properly guarded face diminished trust from their customer base.

Filed Under: Authentication Tagged:

Digital ‘Spring Cleaning’ Tips – Part 2

March 31, 2014 by Entrust, Inc. Leave a Comment
This entry is part 2 of 2 in the series Digital Spring Cleaning

This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]

Filed Under: General Tagged: phishing, spam

Cloud Security Necessary as its Popularity Increases

March 28, 2014 by Entrust, Inc. Leave a Comment

In a move that is sure to encourage more cloud migrations, two popular and competing cloud service providers have cut prices for customers.

Filed Under: Authentication, Cloud, Cloud Security Tagged: