+1-888-690-2424

Entrust Identity On Blog

  • On TAP with the Technology Alliance Program – October 2016

    The Entrust Datacard Technology Alliance program fosters partnerships with other leading organizations to provide customers simple, powerful solutions that address real business challenges.  Four Technology Alliance Program companies were in the news recently – BlackBerry, MobileIron, Mobile Innovations and Safran Identity & Security. Enterprise Mobility Management (EMM) Track News: BlackBerry, MobileIron and Mobile Innovations The newest technology integration between the

        in General
    0
  • Why All the Interest in PKI Again?

    Part 7 of 9 in the Series — Digital DNA
    Back in the 1990s, asymmetric cryptography and Public Key Infrastructure (PKI) using x.509 certificates was a pretty hot topic in security. This technology provided great promise for distributed systems, e-commerce, and digital cash. And, as is common with newer, exciting technologies, it became the hyped up answer to everything wherever cryptographic key management was required. Academic and near-religious arguments ensued about

        in Public Key Infrastructure
    0
  • Why is Certificate Expiration Necessary?

    The Long Life Certificate – Why It Doesn’t Exist Why is certificate expiration even necessary? Wouldn’t it be better if I could just buy a certificate with a long life before expiration? It would really simplify certificate management if it could be installed and forgotten. Simple, no management required, just file-and-forget. Imagine, I’ve been in business, starting say 10 to

        in SSL
    0
  • Building Your Digital DNA: PKI and Cryptographic Disruptors

    Part 6 of 9 in the Series — Digital DNA
    Almost fifteen years ago, I was teaching classes in application security at a large financial institution.  When we got to the part about cryptography, we talked about the importance of not writing your own, of using standard, tested implementations and using proven encryption and hashing algorithms. Some of the examples listed were MD5, SHA-1 and RC4. Fast forward to today:

        in Public Key Infrastructure
    0
  • Why is Certificate Expiration Necessary?

    The Long Life Certificate – Why It Doesn’t Exist Why is certificate expiration even necessary? Wouldn’t it be better if I could just buy a certificate with a long life before expiration? It would really simplify certificate management if it could be installed and forgotten. Simple, no management required, just file-and-forget. Imagine, I’ve been in business, starting say 10 to

        in SSL
    0
  • Building Your Digital DNA: PKI and Cryptographic Disruptors

    Part 6 of 9 in the Series — Digital DNA
    Almost fifteen years ago, I was teaching classes in application security at a large financial institution.  When we got to the part about cryptography, we talked about the importance of not writing your own, of using standard, tested implementations and using proven encryption and hashing algorithms. Some of the examples listed were MD5, SHA-1 and RC4. Fast forward to today:

        in Public Key Infrastructure
    0
Page 6 of 178««...567...10152025...»»