Blog Posts 1-10 of 20
Which Mobile Device Do I Trust?
Whether it’s through the constant use of passwords, answering security questions online or verifying an address over the phone, most people understand the importance of authenticating identities. But this theory also is critical to verify the identities of mobile devices connecting and interacting with a secure network. Today, organizations require a methodical and proven solution [Read More...]
AP Twitter Hack Sends Stock Market into Plunge
The AP Twitter hack lead to a sudden drop in the Dow Jones Industrial Average after the perpetrators sent out a tweet about an attack on the White House
Facebook vs. Salesforce Battle for Enterprise Identity or Straight Consumerization?
I recently read an interesting article by Ericka Chickowski, “Facebook vs. Salesforce: An Identity Smackdown?” at Dark Reading.
Mobile World Congress Reflects Importance of Mobility
February 2013 was a busy month for Entrust. We exhibited at Mobile World Congress in Barcelona, Spain, while concurrently exhibiting at the RSA Conference in San Francisco.
Marc Benioff, Salesforce Identity, Good thing or Bad thing for IAM Security?
Ok, so how many accounts do you have? You know, for things like Facebook, LinkedIn, corporate IDs, loyalty programs (e.g., airlines, credit cards), banks, etc. How many different combinations of usernames and passwords is that? Do they all have the same rules for password combinations? Probably not. Well, some good news for those suffering in [Read More...]
A Framework Approach to Authentication and Identity & Access Management
Around a decade ago, I remember thinking of what it would be like if vendors kept pumping out point solutions to solve each individual problem. Luckily, that trend is not as bad as I may have thought — although I still see many vendors pushing hard for individual point solutions. Is this truly what customers [Read More...]
Conficker, I Knew We Would Meet Again!
Oh, Conficker. I just knew you’d be back in our lives. Somehow, someway. I recently read an interesting article from SC Magazine, “Thanks to weak passwords, Conficker worm still rampant.” Conficker was a nasty little worm that wreaked havoc for a large number of people; I guess you could argue it still is. It all [Read More...]
Apple’s UDIDs – Rejected for App Developers?
I recently read two interesting posts on this subject — one from GigaOM and another from Gartner’s Avivah Litan. Both posts talk about Apple’s recent rejections of apps using the UDID (unique identification number) on iPhones/iPads. The lead issue here is likely related to privacy. As the GigaOM posting pointed out, the UDID can be [Read More...]
NFC Technology Center Stage at RSA 2012
Having just returned from RSA Conference 2012, I spent a great deal of time in and around the Moscone Center. I encountered a few point-of-sale (POS) terminals that were equipped with NFC readers. More specifically, the readers that were intended for use with Google Wallet. I even demoed for Entrust our latest in mobile security [Read More...]
It’s that time of year again
One of the biggest shows in the InfoSec arena — RSA Conference 2012, Feb. 27-March 2) is coming fast. Entrust is working hard to get everything ready — from our booth to our product showcases. And while we can’t wait to show off our new stuff, that’s only one aspect of the show. 2011 was [Read More...]