+1-888-690-2424
  • POODLE Should Kill SSL 3.0

    What is POODLE and why is it threatening SSL 3.0? Entrust security expert Bruce Morton explains the vulnerability and what should be done to close this gap in website security.

        in Alerts, SSL
    0
  • What is SHA-2? Why Should I Care?

    Part 9 of 9 in the Series — SHA-2 Migration
    The Technical and Business Reasons You Need to Move To SHA-2 First, what is SHA? In basic terms, SHA is a component of an SSL certificate used to ensure that data has not been modified. SHA accomplishes this by computing acryptographic function and any change to a given piece of data will result in a different hash value. As a

        in SSL
    0
  • SSL Review: September 2014

    Part 8 of 8 in the Series — SSL Review
    Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: Google is Sun-Setting SHA-1 in Upcoming Chrome Releases Shellshock – What is the Bash Bug Vulnerability? CA Security Council discussed: Google Plans to Deprecate SHA-1 Certificates – Updated Hot Topics

        in SSL
    0
  • SHA-2 Migration Places Spotlight on Diligent Certificate Management

    Part 5 of 9 in the Series — SHA-2 Migration
    If you’re in the process of migrating from SHA-1 to SHA-2 certificates, you may be realizing what a massive undertaking it is to discover and replace all the certificates your organization uses and relies upon. To state the obvious, you can’t manage certificates if you don’t know that they exist, where they’re deployed and when they expire. You must create

        in SSL
    0
  • SSL Review: September 2014

    Part 8 of 8 in the Series — SSL Review
    Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: Google is Sun-Setting SHA-1 in Upcoming Chrome Releases Shellshock – What is the Bash Bug Vulnerability? CA Security Council discussed: Google Plans to Deprecate SHA-1 Certificates – Updated Hot Topics

        in SSL
    0
  • SHA-2 Migration Places Spotlight on Diligent Certificate Management

    Part 5 of 9 in the Series — SHA-2 Migration
    If you’re in the process of migrating from SHA-1 to SHA-2 certificates, you may be realizing what a massive undertaking it is to discover and replace all the certificates your organization uses and relies upon. To state the obvious, you can’t manage certificates if you don’t know that they exist, where they’re deployed and when they expire. You must create

        in SSL
    0
Page 1 of 41123...5101520...»»