Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi…
Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which…
Last year was a nightmare when it came to businesses and cybersecurity. Seemingly every few days, a big new breach…
In an increasingly global market, people everywhere are moving freely across borders and around the globe at a rapid rate….
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a…
FREAK is a new man-in-the-middle (MITM) vulnerability discovered by a group of cryptographers at INRIA, Microsoft Research and IMDEA. FREAK stands…
Defending your enterprise against a cyberattack today is harder than it has ever been before. These days, hackers operate with…
OK, I’m biased, but it’s hard to argue that crypto isn’t a critical enabler of trust in a digital world….
Identity management and authentication have long been a core aspect of information security. So let’s assume that “better authentication” means…
The need to defend against cybercrime extends all the way to our nation’s capital – but our government seems to…