+1-888-690-2424

Entrust Identity On Blog

  • SHA-1 in 2017

    An aggressive policy to remove SSL/TLS certificates signed with the SHA-1 hashing algorithm was announced in November 2013 by Microsoft. The SHA-1 hashing algorithm is was considered weak to collision attacks, so the goal was to move to the stronger SHA-2 family of hashing algorithms. The hash is a cryptographic representation of the certificate, which is used in certificate validation.

        in SSL
    0
  • Ensuring a Trusted Ecosystem in Automotive IoT, Part 2

    Unlocking the Value of Connected Cars with Identity Connected Cars: Cost Savings and New Revenue Opportunities Automotive OEMs want their brands to remain valuable in the minds of the consumer. A valuable brand needs to offer the driver a customized driving experience and a delivery of services that creates a strong relationship post sale. As we discussed in Part 1,

        in Internet of Things
    0
  • Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 2

    Part 9 of 9 in the Series — Digital DNA
    You know that you want to bring PKI into your organization.  You’ve got approval from the leadership team, and you’re starting to work out your budget and requirements. An early question to answer: what trust model do you go with? Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In

        in Public Key Infrastructure, General
    0
  • Ensuring a Trusted Ecosystem in Automotive IoT

    Part 1: Identity as a Basis to Mitigate Risk Connected Cars: Trend Towards Innovation Cars are purchased to meet people’s transportation needs, to get from point A to point B, but consumers are increasingly expecting to have a driving experience that integrates with their connected lives. Daily interaction with smart phones and other consumer electronic technologies have fostered consumer expectation

        in Internet of Things
    0
  • Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 2

    Part 9 of 9 in the Series — Digital DNA
    You know that you want to bring PKI into your organization.  You’ve got approval from the leadership team, and you’re starting to work out your budget and requirements. An early question to answer: what trust model do you go with? Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In

        in Public Key Infrastructure, General
    0
  • Ensuring a Trusted Ecosystem in Automotive IoT

    Part 1: Identity as a Basis to Mitigate Risk Connected Cars: Trend Towards Innovation Cars are purchased to meet people’s transportation needs, to get from point A to point B, but consumers are increasingly expecting to have a driving experience that integrates with their connected lives. Daily interaction with smart phones and other consumer electronic technologies have fostered consumer expectation

        in Internet of Things
    0
Page 8 of 183««...5...789...15202530...»»