Blog Posts 1-8 of 8
Cybersecurity and Pareto Optimality? (Part 1)
This entry is part 1 of 1 in the series Cybersecurity and Pareto OptimalityIn the study of economics there is a technique called Pareto optimality. Pareto Optimality, or Pareto Efficiency, is a guiding force of economic efficiency. Simply put, it is the principle that there exists a balancing point between opposing interests where neither party [Read More...]
Digital Certificates on Your Phone?
It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013. But there is also the myth that certificate-based identities [Read More...]
Twitter Login Verification Announced
In case you hadn’t seen the news, Twitter login verification was announced yesterday. While I certainly don’t want to praise Twitter for implementing second-factor authentication login long after they knew a problem existed, it does remain a solid step in the right direction.
Inside a Twitter Attack: How Hijacked Twitter Accounts are Falling Victim to Digital Theft, Influencing Global Markets
Recently, we have seen a rash of high-profile takeover attacks on Twitter accounts. These Twitter attacks are targeting Western news organizations, but some organizations outside of the news realm (e.g., Burger King) have also come under attack.
Bill Conner, KRLD’s David Johnson Discuss Threats, Going Private & Government’s Involvement in Private Security
Entrust President and CEO Bill Conner went to the airwaves to chat with David Johnson, of KRLD AM 1080, for a CEO Spotlight segment. Their discussion focused on three primary topics: the changing threat landscape, risks and challenges of going private and government involvement in private-sector cybersecurity.
Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.
A Few Thoughts After the Gartner Identity and Access Management Summit
Last week, I attended the Gartner Identity and Access Management Summit in Las Vegas with Entrust product manager Dave Mahdi.
“Can I skip the line? I have an ePassport!”
During ICAO’s 7th symposium, held in Montreal Sept. 12-15, Entrust’s Dave Mahdi and Craig Delmage spoke about ePassports and border control during feature presentations. One common theme: border agents using mobile devices as ePassport readers. Everyone in technology is familiar with