+1-888-690-2424

Entrust Identity On Blog

  • Dropbox Passwords Allegedly Stolen, Published Online

    It was discovered that hundreds of usernames and passwords for file-sharing site Dropbox were published online, and millions more are believed to have been stolen by hackers. The attackers have demanded payment in Bitcoins in exchange for releasing more credentials to an anonymous file-sharing site. 

        in Authentication, Data Breach
    0
  • GM Now has a Cybersecurity Officer

    In a corporate move that's likely to set an important precedent for businesses across industrial sectors, General Motors has chosen to appoint a cybersecurity officer, the first post of its kind at the company, according to Fortune. The appointee is Jeffrey Massimilla and he'll protect security.

        in Authentication, Encryption
    0
  • POODLE Should Kill SSL 3.0

    What is POODLE and why is it threatening SSL 3.0? Entrust security expert Bruce Morton explains the vulnerability and what should be done to close this gap in website security.

        in Alerts, SSL
    0
  • What is SHA-2? Why Should I Care?

    Part 9 of 9 in the Series — SHA-2 Migration
    The Technical and Business Reasons You Need to Move To SHA-2 First, what is SHA? In basic terms, SHA is a component of an SSL certificate used to ensure that data has not been modified. SHA accomplishes this by computing acryptographic function and any change to a given piece of data will result in a different hash value. As a

        in SSL
    0
  • POODLE Should Kill SSL 3.0

    What is POODLE and why is it threatening SSL 3.0? Entrust security expert Bruce Morton explains the vulnerability and what should be done to close this gap in website security.

        in Alerts, SSL
    0
  • What is SHA-2? Why Should I Care?

    Part 9 of 9 in the Series — SHA-2 Migration
    The Technical and Business Reasons You Need to Move To SHA-2 First, what is SHA? In basic terms, SHA is a component of an SSL certificate used to ensure that data has not been modified. SHA accomplishes this by computing acryptographic function and any change to a given piece of data will result in a different hash value. As a

        in SSL
    0
Page 3 of 130««...234...10152025...»»