Blog Posts

Apple Changes S/MIME Certificate Validity Period to 1185-Day... February 2022 by Bruce Morton

In November 2021, we posted that Apple set the validity period of S/MIME certificates to…

Contactless Credit Card and its Security: Understanding the ... February 2022 by Nak Koh

What is a Contactless Credit Card? Contactless technology is a form of communication technology that…

Put your trust in the stack February 2022 by Wayne Lewandowski

Breaches, infiltration, exfiltration, compromised privileges, and interrupted access to critical systems are all parts of…

Right time, right place: opportunities for banks and credit ... February 2022 by Andy Cease

Since the birth of currency, the use of credit has been essential to empowering consumers…

25 years of PKI innovation – what’s changed and what’s... February 2022 by Ian Wills

I am now in my 25th year at Entrust. Some may conclude that I show a…

Leapfrog your PKI – Don’t let a skills shortage stifle b... February 2022 by Juan C. Asenjo

Most of you will be familiar with the term leapfrog. Stemming from a children’s game,…

The Future of Digital Identity January 2022 by Jenn Markey & Shelley Bryen &

The pandemic has both highlighted the problem of not having secure digital identities and accelerated…

Does the announced U.S. federal government strategy to adopt... January 2022 by Jenn Markey

We live in a digital first world, where a once finite network perimeter has been…

2022 – Looking Back, Moving Forward with TLS January 2022 by Bruce Morton

Looking back at 2021 In 2021, HTTPS was everywhere and use of the TLS 1.3…

Why You Need a Root of Trust to be an eIDAS Trust Service Pr... January 2022 by Juan C. Asenjo

We have come a long way in the digital transformation journey. In little over a…

  • Sort by

  • Topic