Category Archives: General

Reactive Cybersecurity Strategy Is Not A Strategy

April 16, 2014 by Jason Soroko     No Comments

It’s encouraging that many organizations have become aware of security of their networks and computer resources. This awareness is sometimes triggered by breach or fraud headlines in tech journalism, which leads to concern and curiosity. It is immediately apparent when I’m speaking with a company that has suffered from an attack because their questions are [Read More...]

Cybersecurity and Pareto Optimality? (Part 1)

April 10, 2014 by Matthew Lewis     No Comments
This entry is part 1 of 1 in the series Cybersecurity and Pareto Optimality

This entry is part 1 of 1 in the series Cybersecurity and Pareto OptimalityIn the study of economics there is a technique called Pareto optimality. Pareto Optimality, or Pareto Efficiency, is a guiding force of economic efficiency. Simply put, it is the principle that there exists a balancing point between opposing interests where neither party [Read More...]

Filed Under: General Tagged With: Pareto Optimality

Same Services, New Names

April 8, 2014 by Entrust, Inc.     No Comments

The introduction of Entrust IdentityGuard Cloud Services presents an innovative consolidation of Entrust’s most popular and reliable security solutions. This evolution also brings about changes to the names of some of your favorite products. To simplify these changes, please review the following chart to see how the name changes could affect you and your organization. [Read More...]

Filed Under: Certificate Management, Cloud, General, SSL Tagged With:

Digital ‘Spring Cleaning’ Tips – Part 2

March 31, 2014 by Entrust, Inc.     No Comments
This entry is part 2 of 2 in the series Digital Spring Cleaning

This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]

Filed Under: General Tagged With: phishing, spam

Microsoft Warns of Malicious RTF Files, Remote Code Execution

March 27, 2014 by Entrust, Inc.     No Comments

On Monday, Microsoft issued a security advisory (2953095) notifying IT professionals and end-consumers of a vulnerability affecting “supported versions of Microsoft Word.” Per the advisory, specific rich text files (.RTF) that can be opened or previewed using many Microsoft software products, specifically Microsoft Word (2003-2013)and related service packs, could leave users vulnerable to remote code [Read More...]

Filed Under: General Tagged With: rtf

Digital ‘Spring Cleaning’ Tips – Part 1

March 26, 2014 by Entrust, Inc.     No Comments
This entry is part 1 of 2 in the series Digital Spring Cleaning

This entry is part 1 of 2 in the series Digital Spring Cleaning Unfortunately, end-users are often left out of the conversation when looking for ways to bolster security across the enterprise. A lack of training and education often play a big part in leaving end-users exposed to nasty forms of malware that can infiltrate [Read More...]

Filed Under: General Tagged With:

How Can Financial Institutions Drive Better Risk Assessment?

March 25, 2014 by Entrust, Inc.     No Comments

Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]

Filed Under: Fraud, General Tagged With:

Who Will Control ICANN?

March 24, 2014 by Bruce Morton     No Comments

Internet Corporation for Assigned Names and Numbers (ICANN) manages domain names for websites and email servers. To date, ICANN has been controlled by the U.S Department of Commerce; however, the contract will expire in September 2015. The U.S Department of Commerce has always overseen ICANN, but generally “rubber stamps” their approach. This matches the thought [Read More...]

Filed Under: General Tagged With:

Elliptic-Curve Cryptography, Simplified

March 18, 2014 by Tim Moses     1 Comment

As both standalone and networked computing capabilities continue to grow in-line with Moore’s law, key sizes for the most widely used public-key cryptographic systems have to grow disproportionately fast. This trend makes a switch to elliptic-curve cryptography (ECC) more and more attractive. Unfortunately, ECC has a reputation for being difficult to understand. And this reputation, [Read More...]

Filed Under: General Tagged With: elliptic curve cryptography

Entrust at RSA: And We’re Out

February 27, 2014 by Entrust, Inc.     No Comments
This entry is part 11 of 12 in the series Entrust at RSA 2014

This entry is part 11 of 12 in the series Entrust at RSA 2014 What an amazing week. We’ve met an untold number of new people, shared security experiences and challenges, gave away amazingly cool gifts and, of course, took home a pair of SC Magazine Reader Trust Awards. Let’s not waste our new relationships. [Read More...]

Filed Under: General Tagged With: