Entrust Identity On: Latest Posts
The introduction of Entrust IdentityGuard Cloud Services presents an innovative consolidation of Entrust’s most popular and reliable security solutions. This evolution also brings about changes to the names of some of your favorite products. To simplify these changes, please review the following chart to see how the name changes could affect you and your organization. [Read More...]
Are you a CISO, IT manager, administrator or even a non-technology manager tasked with security-related objectives outside of your scope? Entrust is here to help make your job easier. No matter what type of Entrust security solution you and your organization currently trusts — SSL, device certificates, certificate management and discovery, smart credentialing or even [Read More...]
A move to the cloud provided better security for one university.
We have discussed the SHA-1 deprecation policy and why you should move to SHA-2. The certification authorities (CAs) have provided methods to have your certificates issued and signed using a SHA-2 hashing algorithm. As we move ahead, you will see the CAs changing the default signing algorithm from SHA-1 to SHA-2. It’d be sound strategy [Read More...]
Cybercrime works like any other criminal enterprise. And to protect against criminals, users must defend themselves.
Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: 2014 – Looking Back, Moving Forward Elliptic-Curve Cryptography, Simplified Who will Control ICANN? Your Audit Report has Expired CA Security Council discussed: Think Twice Before [Read More...]
David Wagner explained that the Target debacle doesn’t have to happen to the well-guarded company.
Malware poses a continued and ever-strengthening threat. But users can guard themselves against attack.
Businesses that aren’t properly guarded face diminished trust from their customer base.
This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]