+1-888-690-2424

Entrust Identity On Blog

  • Building Your Digital DNA: PKI and Cryptographic Disruptors

    Part 6 of 9 in the Series — Digital DNA
    Almost fifteen years ago, I was teaching classes in application security at a large financial institution.  When we got to the part about cryptography, we talked about the importance of not writing your own, of using standard, tested implementations and using proven encryption and hashing algorithms. Some of the examples listed were MD5, SHA-1 and RC4. Fast forward to today:

        in Public Key Infrastructure
    0
  • PROVE IT: Three Things Always-On SSL and HTTPS Everywhere Will Change About the Internet

    Part 6 of 6 in the Series — Prove It!
    Last year, Google made waves by charging a push for every website on the Internet to be secured by an SSL/TLS certificate. The push for “HTTPS Everywhere” or “Always-on HTTPS” has been surging. The concept of HTTPS and SSL/TLS certificates has gone mainstream, with thousands of times more SSL/TLS certificates on the Internet today than in 1996 leading to the

        in SSL
    0
  • Protect Your Domain with CT Search

    How would you know if there have been any unauthorized SSL certificates issued for your domain? How can you protect your domain name and the people who use your web site from this happening? The CT Search tool makes it quite simple. Just type in your domain name and decide whether to select expired certificates and subdomains. Instantly all certificates

        in SSL
    0
  • Carry Your Keys on a Chain

    Part 5 of 9 in the Series — Digital DNA
    Opinions vary widely concerning the significance of blockchain technology. Some commentators compare its potential impact on society to that of the telephone, while others remain deeply skeptical about its practicality. Surely, the truth lies somewhere between; blockchain technology is evolving, and practical variants will emerge. But, for many applications, existing solutions will continue to outperform their blockchain counterparts. The most

        in Public Key Infrastructure
    0
  • Protect Your Domain with CT Search

    How would you know if there have been any unauthorized SSL certificates issued for your domain? How can you protect your domain name and the people who use your web site from this happening? The CT Search tool makes it quite simple. Just type in your domain name and decide whether to select expired certificates and subdomains. Instantly all certificates

        in SSL
    0
  • Carry Your Keys on a Chain

    Part 5 of 9 in the Series — Digital DNA
    Opinions vary widely concerning the significance of blockchain technology. Some commentators compare its potential impact on society to that of the telephone, while others remain deeply skeptical about its practicality. Surely, the truth lies somewhere between; blockchain technology is evolving, and practical variants will emerge. But, for many applications, existing solutions will continue to outperform their blockchain counterparts. The most

        in Public Key Infrastructure
    0
Page 7 of 179««...678...10152025...»»