+1-888-690-2424

Entrust Identity On Blog

  • Thwart the Holiday Humbug with These Safe Online Shopping Tips

    Part 1 of 2 in the Series — Holiday Humbug
    Ensuring Transaction Security (part 1 of a 2-part series) Don’t let a cyberscam spoil your holiday cheer. Cybercriminals work daily to craft new ways to steal your personal data for financial gain. They are clever and tenacious and these year-round Scrooges want nothing more for the holidays than to shout, “Bah humbug!” as they lure you in and rob you.

        in SSL, General
    0
  • Using Strong Authentication to Turn a Negative Experience to Positive

    Mobile technologies have become more relevant in the payment space and are also now being used to prevent fraud. As technologies transform the way we do business, they open doors to fraudulent activity. With call center, ATM and card not present fraud on the rise, financial institutions need solutions that can provide a hassle-free experience to customers while reducing fraud.

        in Authentication, General
    0
  • SSL Review: November 2016

    Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust Identity ON: Is Web Security Part of Your Annual Security Audit? Certificate Transparency Deployment in 2017 Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 1 Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations,

        in SSL
    0
  • SHA-1 in 2017

    An aggressive policy to remove SSL/TLS certificates signed with the SHA-1 hashing algorithm was announced in November 2013 by Microsoft. The SHA-1 hashing algorithm is was considered weak to collision attacks, so the goal was to move to the stronger SHA-2 family of hashing algorithms. The hash is a cryptographic representation of the certificate, which is used in certificate validation.

        in SSL
    0
  • SSL Review: November 2016

    Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust Identity ON: Is Web Security Part of Your Annual Security Audit? Certificate Transparency Deployment in 2017 Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 1 Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations,

        in SSL
    0
  • SHA-1 in 2017

    An aggressive policy to remove SSL/TLS certificates signed with the SHA-1 hashing algorithm was announced in November 2013 by Microsoft. The SHA-1 hashing algorithm is was considered weak to collision attacks, so the goal was to move to the stronger SHA-2 family of hashing algorithms. The hash is a cryptographic representation of the certificate, which is used in certificate validation.

        in SSL
    0
Page 9 of 184««...5...8910...15202530...»»