Skip to main content
FEATURED POST

Preventing Hyperjacking in a virtual environment

READ POST

sitting woman in yellow top holding credit card and tablet

Most recent posts

An Approach to Resolving PKI Talent Scarcity March 2023 by Ngook Kong

Every year, the Ponemon Institute surveys more than 2,500 IT leaders who are immersed in PKI management at an enterprise level. The most recent survey — issued in mid-2022 — identified a pattern seen over previous years. According to authors…

Do you have Cryptographic Agility? March 2023 by Ian Wills

There is a consensus across industry and governments that organizations should start planning how they will maintain security of IT systems and data given likely advances in quantum computing.  Going forward, our cryptographic estates are likely to be less stable,…

Tokenization: Enabling the Intersection of Data Security and Exceptional User Experiences March 2023 by Nicolas Bruley

Tokenization in the financial card space is not new. Generally speaking, the technology was first applied to electronic payments in the late 1990s. However, trends in e-commerce and data privacy, along with the relentless evolution of hacking methodologies and technologies,…

Entrust Software Security Architect Recognized as an Excellence Award Finalist by Microsoft March 2023 by Cindy Provin

It’s with great pride that we announce our colleague Mike Ounsworth has been named an award finalist in the Microsoft Security Excellence Awards 2023 in the category of Security Changemaker. This is the fourth year Microsoft is recognizing partners for…

VIEW ALL POSTS

All Topics

All Contributors