Category Archives: General

Cybersecurity and Pareto Optimality? (Part 2)

April 24, 2014 by Matthew Lewis     No Comments
This entry is part 2 of 2 in the series Cybersecurity and Pareto Optimality

This entry is part 2 of 2 in the series Cybersecurity and Pareto OptimalityIn my previous post, I discussed cybersecurity, primarily from the defensive point of view, and provided a simplistic explanation of Pareto Optimality.   Defense isn’t the only side at play. However, we tend to think in terms of defense, which leans toward [Read More...]

Filed Under: General Tagged With: Pareto Optimality

Entrust President Talks the Evolution of Identity with IT Harvest

April 22, 2014 by Entrust, Inc.     No Comments

What’s next for Entrust? Entrust president David Wagner sat down with IT Harvest’s Richard Stiennon at RSA Conference 2014 to discuss Entrust’s past, present and future role in security technology, and the state of the industry as a whole. Datacard Group Acquisition of Entrust After being acquired by Datacard Group in December 2013, integration of [Read More...]

Reactive Cybersecurity Strategy Is Not A Strategy

April 16, 2014 by Jason Soroko     No Comments

It’s encouraging that many organizations have become aware of security of their networks and computer resources. This awareness is sometimes triggered by breach or fraud headlines in tech journalism, which leads to concern and curiosity. It is immediately apparent when I’m speaking with a company that has suffered from an attack because their questions are [Read More...]

Cybersecurity and Pareto Optimality? (Part 1)

April 10, 2014 by Matthew Lewis     No Comments
This entry is part 1 of 2 in the series Cybersecurity and Pareto Optimality

This entry is part 1 of 2 in the series Cybersecurity and Pareto OptimalityIn the study of economics there is a technique called Pareto optimality. Pareto Optimality, or Pareto Efficiency, is a guiding force of economic efficiency. Simply put, it is the principle that there exists a balancing point between opposing interests where neither party [Read More...]

Filed Under: General Tagged With: Pareto Optimality

Same Services, New Names

April 8, 2014 by Entrust, Inc.     No Comments

The introduction of Entrust IdentityGuard Cloud Services presents an innovative consolidation of Entrust’s most popular and reliable security solutions. This evolution also brings about changes to the names of some of your favorite products. To simplify these changes, please review the following chart to see how the name changes could affect you and your organization. [Read More...]

Filed Under: Certificate Management, Cloud, General, SSL Tagged With:

Digital ‘Spring Cleaning’ Tips – Part 2

March 31, 2014 by Entrust, Inc.     No Comments
This entry is part 2 of 2 in the series Digital Spring Cleaning

This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]

Filed Under: General Tagged With: phishing, spam

Microsoft Warns of Malicious RTF Files, Remote Code Execution

March 27, 2014 by Entrust, Inc.     No Comments

On Monday, Microsoft issued a security advisory (2953095) notifying IT professionals and end-consumers of a vulnerability affecting “supported versions of Microsoft Word.” Per the advisory, specific rich text files (.RTF) that can be opened or previewed using many Microsoft software products, specifically Microsoft Word (2003-2013)and related service packs, could leave users vulnerable to remote code [Read More...]

Filed Under: General Tagged With: rtf

Digital ‘Spring Cleaning’ Tips – Part 1

March 26, 2014 by Entrust, Inc.     No Comments
This entry is part 1 of 2 in the series Digital Spring Cleaning

This entry is part 1 of 2 in the series Digital Spring Cleaning Unfortunately, end-users are often left out of the conversation when looking for ways to bolster security across the enterprise. A lack of training and education often play a big part in leaving end-users exposed to nasty forms of malware that can infiltrate [Read More...]

Filed Under: General Tagged With:

How Can Financial Institutions Drive Better Risk Assessment?

March 25, 2014 by Entrust, Inc.     No Comments

Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]

Filed Under: Fraud, General Tagged With:

Who Will Control ICANN?

March 24, 2014 by Bruce Morton     No Comments

Internet Corporation for Assigned Names and Numbers (ICANN) manages domain names for websites and email servers. To date, ICANN has been controlled by the U.S Department of Commerce; however, the contract will expire in September 2015. The U.S Department of Commerce has always overseen ICANN, but generally “rubber stamps” their approach. This matches the thought [Read More...]

Filed Under: General Tagged With: