+1-888-690-2424

Entrust Identity On Blog

  • This Year, Enterprise Cyber Preparedness Needs To Come Into Spotlight

    Last year was a nightmare when it came to businesses and cybersecurity. Seemingly every few days, a big new breach popped up — one that compromised patron data, blemished a business’ reputation and generally left customers with an uneasy feeling about the security of their personal information. This year, companies out there have two basic options when it comes to securing

        in Authentication, Encryption, Fraud Detection
    0
  • SHA-1 Deprecation Update – Not Chrome 41, but Chrome 42

    Chrome 41 was released on March 3, 2015. You may have noticed, Chrome 41 did not have a change to treat certificate chains using SHA-1 valid past January 1, 2017 to be affirmatively insecure.       The affirmatively insecure representation will now occur in Chrome 42. We expect Chrome 42 to be released about April 14, 2015. We continue

        in SSL, SSL Deployment
    0
  • Private Trust and Proxies

    With the news of Superfish, Komodia and PrivDog , there has been some interesting discussion on private trust and HTTPS proxies. Private Trust By private trust, I mean the use of private certification authorities (CAs). On the Internet, we use public trust CAs. These CAs are created in accordance with browser certificate policies, are highly secured and are audited on

        in Alerts, PKI, SSL
    0
  • What’s Next for PKI?

    Part 5 of 6 in the Series — The Evolution of Public Key Infrastructure
    As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology thus far.

        in PKI
    0
  • Private Trust and Proxies

    With the news of Superfish, Komodia and PrivDog , there has been some interesting discussion on private trust and HTTPS proxies. Private Trust By private trust, I mean the use of private certification authorities (CAs). On the Internet, we use public trust CAs. These CAs are created in accordance with browser certificate policies, are highly secured and are audited on

        in Alerts, PKI, SSL
    0
  • What’s Next for PKI?

    Part 5 of 6 in the Series — The Evolution of Public Key Infrastructure
    As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology thus far.

        in PKI
    0
Page 8 of 149««...5...789...15202530...»»