+1-888-690-2424

Entrust Identity On Blog

  • Securing the Automotive IoT Ecosystem

    Vehicles have had embedded computation and networking since the 1980s, but vehicles are now increasingly connected. This means OEMs are faced with an increased risk surface that requires mitigation. Managed identities enable controller components to uniquely identify each other. Authentication, authorization and data integrity offer a secure internal vehicle system. After a connected vehicle is sold, there are revenue opportunities

        in Internet of Things
    0
  • SSL Review: February 2017

    Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust Identity ON: Bad Actors Catalyst Behind New Standards for Code Signing CA Security Council: Browser UI Security Indicators Endorse Website Identity SHAttered breaks SHA-1 … SHAttered home page Announcing the first SHA1 collision Bang! SHA-1 collides at 38762cf7­f55934b3­4d179ae6­a4c80cad­ccbb7f0a HTTPS over 50 percent

        in SSL
    0
  • SHAttered – First SHA-1 Collision

    Google and CWI announced SHAttered, an attack on the SHA-1 cryptographic hash function. The attack was demonstrated by allowing the cryptographic signature on a good PDF to be the same as on a bad PDF. In other words, they forged the signature. Some Background As computing power and research continue to grow, hash functions will become weak over time. Over

        in SSL
    0
  • Telcom Industry and IoT: From ‘Can You Hear Me Now’ to Secure Service Delivery

    Market Position Connectivity is a core capability of the Internet of Things (IoT). Massive mobile network operator (MNO) investment in connectivity infrastructure has given the industry a strong market position.  But this technology was focused on SIM cards in mobile devices, selling connectivity contracts to individuals.  It is no longer just people, but now also devices connecting to the internet.

        in Internet of Things
    0
  • SHAttered – First SHA-1 Collision

    Google and CWI announced SHAttered, an attack on the SHA-1 cryptographic hash function. The attack was demonstrated by allowing the cryptographic signature on a good PDF to be the same as on a bad PDF. In other words, they forged the signature. Some Background As computing power and research continue to grow, hash functions will become weak over time. Over

        in SSL
    0
  • Telcom Industry and IoT: From ‘Can You Hear Me Now’ to Secure Service Delivery

    Market Position Connectivity is a core capability of the Internet of Things (IoT). Massive mobile network operator (MNO) investment in connectivity infrastructure has given the industry a strong market position.  But this technology was focused on SIM cards in mobile devices, selling connectivity contracts to individuals.  It is no longer just people, but now also devices connecting to the internet.

        in Internet of Things
    0
Page 7 of 186««...678...10152025...»»