Blog Posts

New Publication From the Cloud Security Alliance (CSA): Hard... May 2024 by Iain Beveridge

I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group for…

Resolving the Zero Trust Encryption Paradox May 2024 by Jenn Markey

PKI and cryptography are critical components of a Zero Trust strategy, driving the use of…

Zero Trust and AI: You Can’t Have One Without the Other May 2024 by Jenn Markey

Cyberattacks were forecast to have cost the global economy $8 trillion USD in 2023, and…

NSA Announces Update to Commercial National Security Algorit... May 2024 by Iain Beveridge

In October 2022, Entrust published the article, NSA Announces New Post-Quantum Resistant Algorithm Suite 2.0…

The Dark Side of GenAI: Safeguarding Against Digital Fraud May 2024 by Tony Ball

Generative artificial intelligence (GenAI) has the capacity to create new opportunities, disrupt how we work,…

SSL Review: March 2024 May 2024 by Bruce Morton

The Entrust monthly digital certificates review covers a range of topics, including news, trends, and…

Why Zero Trust is a Must for Strong Corporate Governance April 2024 by Jenn Markey

Gone are the days of delegating technology and cybersecurity concerns to be solved solely by…

Biometrics: A Flash Point in AI Regulation April 2024 by Jenn Markey & Aled Lloyd Owen &

According to proprietary verification data from Onfido (now a part of Entrust), deepfakes rose 3000%…

Using Data Analytics to Minimize Rejects in High-Volume Card... April 2024 by Matthew Dunsmore

In the fast-paced and high-stakes industry of high-volume card production, minimizing rejects is crucial not…

Don’t Leave the Door Open to Threat Actors April 2024 by Iain Beveridge & Andrew Massi &

We came across this recent Joint Cybersecurity Advisory paper: “Threat Actor Leverages Compromised Account of…

  • Sort by

  • Topic