Resources Archive - Page 2 of 73 - Entrust, Inc. 5-8 of 292

Migrate to SHA-2 SSL Certificates – A Step-by-Step Migration Guide

October 3, 2014 by Geoff Blaine
Many organizations urgently need to upgrade to SHA-2 (also known as SHA-256) SSL certificates in conjunction with updated federal and PCI compliance standards currently in place, as well as to meet Microsoft’s and Google’s SHA-1 deprecation policies set to begin in November 2014. SHA-1 has been in use among commercial certification authorities (CAs) since the [Read More...]

TeleSign SMS & Voice Authentication

September 12, 2014 by Geoff Blaine
Seamless Integration with Entrust IdentityGuard The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency. As the use of mobile devices and applications grows, so do the rate and sophistication of network and identity attacks on organizations and individuals. This momentum is compounded by the introduction of numerous [Read More...]

Defending the Internet of Things: Identity at the Core of Security

September 9, 2014 by Geoff Blaine
Attacks on traditional IT systems have resulted in massive loss of money, privacy and intellectual property. Even worse, attacks on the Internet of Things (IoT) potentially threaten our safety. This threat landscape exists alongside the ever-increasing demand for more technology to be embedded into coordinated devices used in healthcare, automobiles, aviation, critical infrastructure and smart [Read More...]

Zero to ECDH (Elliptic-Curve Diffie-Hellman) in 30 Minutes

August 18, 2014 by Geoff Blaine
This is a quick primer on the elliptic-curve Diffie-Hellman (ECDH) key-agreement scheme. It provides a simple illustration of how the properties of elliptic-curve cryptography (ECC) can be used to build a useful security scheme. A key agreement scheme is a procedure by which two or more parties agree upon a value from which they can [Read More...]