Entrust Identity On: Latest Posts

Entrust at RSA: VP Rockvam’s Exclusive Interview with iSMG

February 27, 2014 by Entrust, Inc. Leave a Comment
This entry is part 10 of 12 in the series Entrust at RSA 2014

This entry is part 10 of 12 in the series Entrust at RSA 2014 It’s no secret that digital identities are evolving. From how they’re used, managed and deployed, digital identities are one of today’s most critical and sensitive assets. Entrust vice president David Rockman sat down for an exclusive one-on-one interview with iSMG vice [Read More...]

Filed Under: General Tagged: RSAC

Entrust at RSA: Day 4 Finale

February 27, 2014 by Entrust, Inc. Leave a Comment
This entry is part 11 of 12 in the series Entrust at RSA 2014

This entry is part 11 of 12 in the series Entrust at RSA 2014 Just because it’s the final day, doesn’t mean Entrust isn’t ready to talk about the evolution of digital identities. We’ve got a pair of our most popular demos on tap today. Spend your morning with us at Booth 2615 in the [Read More...]

Filed Under: General Tagged:

Entrust at RSA: Providing Flexibility, Choice with an Authentication Platform

February 26, 2014 by Entrust, Inc. Leave a Comment
This entry is part 7 of 12 in the series Entrust at RSA 2014

This entry is part 7 of 12 in the series Entrust at RSA 2014 Aren’t enterprises and other security-conscious organizations tired of bolting on single point solutions in hopes of solving many different security challenges? What if threats evolve quicker than they do? What if authenticators are compromised? All this week at Entrust’s Identity: Evolved [Read More...]

Entrust at RSA: Secure Mobile is the New Enterprise Desktop

February 26, 2014 by Entrust, Inc. Leave a Comment
This entry is part 9 of 12 in the series Entrust at RSA 2014

This entry is part 9 of 12 in the series Entrust at RSA 2014 It may sound like a quote from the classic ‘90s sitcom Seinfeld, but worlds are definitely colliding. As the evolution of identities, mobility, cloud/apps and malware gain momentum, the collision course has never been more apparent than the present. The only [Read More...]

Filed Under: General Tagged: mobile, RSAC

Entrust at RSA: Two for Two at SC Awards 2014

February 26, 2014 by Entrust, Inc. Leave a Comment
This entry is part 8 of 12 in the series Entrust at RSA 2014

This entry is part 8 of 12 in the series Entrust at RSA 2014 Hard work pays off. How do we know? SC Magazine honored Entrust with a pair of Reader Trust Awards during the SC Awards 2014 Tuesday night in San Francisco. Entrust TransactionGuard and Entrust IdentityGuard were honored as top products in the [Read More...]

Filed Under: General Tagged: Fraud Detection, RSAC, SC Magazine

Entrust at RSA: Live for Day 3

February 26, 2014 by Entrust, Inc. Leave a Comment
This entry is part 6 of 12 in the series Entrust at RSA 2014

This entry is part 6 of 12 in the series Entrust at RSA 2014 After a huge night at the SC Awards 2014 — ahem, we went two for two — Entrust is live and ready for Day 3 at RSA Conference 2014. We’re still loaded with live presentations, demos and even more giveaways. Ready [Read More...]

Filed Under: General Tagged:

Entrust at RSA: How to Manage Identities, Certificates from the Cloud

February 25, 2014 by Entrust, Inc. 1 Comment
This entry is part 5 of 12 in the series Entrust at RSA 2014

This entry is part 5 of 12 in the series Entrust at RSA 2014 What are the biggest trends in information security? Cloud, mobility and identities. Wouldn’t it be great if there was a method to manage identities, devices, applications, machines and more from a single console from the cloud? Entrust product marketing manager Rob [Read More...]

Filed Under: General Tagged: digital certificates, Identity, RSAC

Entrust at RSA: ‘Pass the Hash’

February 25, 2014 by Entrust, Inc. Leave a Comment
This entry is part 4 of 12 in the series Entrust at RSA 2014

This entry is part 4 of 12 in the series Entrust at RSA 2014 Jason Soroko, Entrust’s head of malware research, is causing quite the RSA buzz with his latest video presentation: “Pass the Hash.” Outlined in a blog post a few weeks ago, Soroko explains about a lesser-known attack vector that exploits single sign-on [Read More...]

Filed Under: General Tagged: Microsoft Windows, RSAC, SSO

Entrust at RSA: Ready for Day 2

February 25, 2014 by Entrust, Inc. Leave a Comment
This entry is part 3 of 12 in the series Entrust at RSA 2014

This entry is part 3 of 12 in the series Entrust at RSA 2014 Get ready to experience Identity: Evolved. The first full day of Entrust at RSA Conference 2014 is here. We’re bringing the perfect mixture of cloud coolness, must-have mobile security and I-need-that-today giveaways. More on that after today’s schedule below. Tuesday, Feb. [Read More...]

Filed Under: General Tagged:

Apple SSL Bug: Test Your Vulnerability, Fix Available Soon

February 24, 2014 by Bruce Morton Leave a Comment

On Friday, Feb. 21, Apple issued a security bulletin for iOS 7.0.6. There was not much detail in the bulletin, but it did state that the impact was “An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS.” The problem is the result of a coding error where [Read More...]