Blog Posts

Identity Fraud Does Not Discriminate June 2024 by Simon Horswell

From banking to real estate, healthcare, ride sharing, and more, it’s increasingly clear that no…

Digital Identity: There’s a Lot at Stake June 2024 by Jenn Markey

Midway through 2024, we’ve moved beyond digital transformation to become digital first. From shopping to…

Adoption of Composite Signatures Is Major Milestone for Post... June 2024 by Mike Ounsworth & Iain Beveridge &

Hopefully there’s no need for a post-quantum preamble to this blog. Any techies who have…

Financial Institutions Must Reexamine Their Technology Setup June 2024 by Nak Koh

In today’s fast-evolving financial landscape where customer expectations and technological advancements are constantly shifting, financial…

VMware Hypervisor Security – Critical Vulnerabilities Rela... May 2024 by Guillaume Cesbron

Protecting ESXi hosts is crucial to ensure the confidentiality, integrity, and availability of virtualized environments,…

New Publication From the Cloud Security Alliance (CSA): Hard... May 2024 by Iain Beveridge

I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group for…

Resolving the Zero Trust Encryption Paradox May 2024 by Jenn Markey

PKI and cryptography are critical components of a Zero Trust strategy, driving the use of…

Zero Trust and AI: You Can’t Have One Without the Other May 2024 by Jenn Markey

Cyberattacks were forecast to have cost the global economy $8 trillion USD in 2023, and…

NSA Announces Update to Commercial National Security Algorit... May 2024 by Iain Beveridge

In October 2022, Entrust published the article, NSA Announces New Post-Quantum Resistant Algorithm Suite 2.0…

The Dark Side of GenAI: Safeguarding Against Digital Fraud May 2024 by Tony Ball

Generative artificial intelligence (GenAI) has the capacity to create new opportunities, disrupt how we work,…

  • Sort by

  • Topic