+1-888-690-2424

Entrust Identity On Blog

  • Top 4 Reasons To Prioritize Enterprise Security

    One big reason that enterprises dodge implementing robust cybersecurity strategies is because they don't grasp the importance and urgency of keeping the corporate virtual system protected.

        in Authentication, Encryption
    0
  • Why Businesses Need To Get Serious About Enterprise Security

    Many small and medium-sized businesses won't even recovery from a breach. So why aren't companies doing more to stop them?

        in Authentication, Encryption
    0
  • What Happened with Live.fi?

    Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Microsoft. Was this Comodo’s fault? Let’s discuss. Since 2012, the certification authorities (CAs) which issue public trust SSL certificates must follow the domain verification methods in the CA/Browser Forum Baseline Requirements (BRs). The BRs provide

        in SSL
    0
  • 20 Years of PKI and Secure Transactions

    Part 1 of 6 in the Series — The Evolution of Public Key Infrastructure
    Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which represented the public trust of the first Internet root CAs. Slowly, these root certificates were provided to operating system and browser vendors to be embedded in their software. Embedding indicated that the software vendor trusted the CA to issue publicly

        in PKI, SSL
    0
  • What Happened with Live.fi?

    Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Microsoft. Was this Comodo’s fault? Let’s discuss. Since 2012, the certification authorities (CAs) which issue public trust SSL certificates must follow the domain verification methods in the CA/Browser Forum Baseline Requirements (BRs). The BRs provide

        in SSL
    0
  • 20 Years of PKI and Secure Transactions

    Part 1 of 6 in the Series — The Evolution of Public Key Infrastructure
    Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which represented the public trust of the first Internet root CAs. Slowly, these root certificates were provided to operating system and browser vendors to be embedded in their software. Embedding indicated that the software vendor trusted the CA to issue publicly

        in PKI, SSL
    0
Page 9 of 151««...5...8910...15202530...»»