Resources - 2/29 - Entrust, Inc. 11-20 of 285
Zero to Dual_EC_DRBG in 30 minutes: The Suspect Dual EC DRBG Cryptographic Mechanism
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States. NIST helps promote domestic innovation by advancing, monitoring and evaluating technical standards and measurement sciences. Core to its mission, NIST produces special publications to disseminate policies, standards and findings to related security and technology communities. [Read More...]
It’s Cyber Warfare: How Financial Institutions and Banks can use Authentication to Secure Identites and Transactions
Today, financial institutions offering Internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware (e.g., man-in-the-browser attacks, ZeuS, SpyEye, Ice IX, ransomware) and other fraudulent activities. With significant advances in criminal threats — both in sophistication and sheer frequency — organizations such as the U.S. Federal Financial Institutions Examination [Read More...]
Healthcare Authentication for Centers for Medicare & Medicaid Services Compliance
In July 2012, the Centers for Medicare & Medicaid Services (CMS) issued the standard1 for the use of multifactor authentication mechanisms in CMS systems. As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations. We work with many of the top healthcare organizations in the United [Read More...]
Entrust Private SSL Certificates
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates. Deploying Entrust Private [Read More...]
What is Code Signing?
This paper discusses how code signing works and the best practices to perform code signing.
Perception Versus Reality: Mobile Security Gains Traction as Enterprises Embrace New Technology
While the security of mobile devices continues to fight an inaccurate perception, the reality is quite clear: mobile devices possess stronger security architecture when compared to PCs. When properly managed and protected, mobile devices serve as a formidable platform for securing digital identities and online transactions. Despite the growing reliance on mobility, IT decision-makers still [Read More...]
Entrust & IBM Security Integration
Built-in integration between the Entrust IdentityGuard software authentication platform and the IBM Security Access Manager for Web — specifically for stronger risk-based authentication — enables organizations to realize the potential of secure access management and identity-based security. Entrust IdentityGuard seamlessly integrates into the IBM Security Access Manager for Web solution for true risk-based authentication that’s [Read More...]