Zum Hauptinhalt springen

5007 ITEMS

Blog Post

Securing the Internet of Things: Devices & Networks

The Internet of Things (IoT) is changing manufacturing for the better.With data from billions of connected devices and trillions of sensors, supply ch...
Blog Post

Certificate Transparency Deadline Moved to April 2018

Google just announced they will not be enforcing certificate transparency (CT) logging for all new TLS certificates until April 2018. In a previous bl...
Blog Post

Understanding SHA-1 Vulnerabilities “” Is SSL No Longer Secure?

Lately, SSL has come under fire and users may be under the impression that, perhaps, there is a problem with SSL.First, there was the announcement of ...
Blog Post

3 Critical Mistakes to Avoid When Migrating to SHA-2

SHA-1 has been in use among commercial certification authorities (CAs) since the late 1990s, and today accounts for the overwhelming majority of digit...
Blog Post

HTTP Public Key Pinning: No Longer a Good Idea

Public Key Pinning was great idea at first. Google used static public keys to protect their websites. In doing so, the keys were embedded in Chrome an...
Blog Post

Evolution of Identity

The Evolution of Identity in the Connected WorldYou may think you know who you are. But the truth is, your identity is becoming richer and more comple...
Blog Post

What can the Equifax and other website breaches teach us about good security habits?

Why do some car drivers go for decades without an accident, and others seem to be involved in mishaps more frequently? Typically, it’s a matter of goo...
Blog Post

CARTES Paris Day 2 Recap

We celebrated a successful day 2 of CARTES Paris 2014. We opened the day with Todd Wilkinson, CEO of Entrust Datacard presenting our new corporate bra...
Blog Post

Welcome To The New Entrust Datacard

We are pleased to announce that two industry leaders — Entrust and Datacard Group — are combining decades of experience to provide trusted identities ...
Blog Post

Critical Infrastructure Industries Get Serious About Cybersecurity

So far, 2014 appears to be a turning point on cybersecurity for companies involved in critical infrastructure.For quite some time, these industries fe...
Product Categories