Blog Posts

Why Zero Trust is a Must for Strong Corporate Governance April 2024 by Jenn Markey

Gone are the days of delegating technology and cybersecurity concerns to be solved solely by…

Biometrics: A Flash Point in AI Regulation April 2024 by Jenn Markey & Aled Lloyd Owen &

According to proprietary verification data from Onfido (now a part of Entrust), deepfakes rose 3100%…

Using Data Analytics to Minimize Rejects in High-Volume Card... April 2024 by Matthew Dunsmore

In the fast-paced and high-stakes industry of high-volume card production, minimizing rejects is crucial not…

Don’t Leave the Door Open to Threat Actors April 2024 by Iain Beveridge & Andrew Massi &

We came across this recent Joint Cybersecurity Advisory paper: “Threat Actor Leverages Compromised Account of…

CA/Browser Forum Updates Code Signing Service Requirements April 2024 by Bruce Morton

The CA/Browser Form Code Signing Working Group has recently updated the Signing Service Requirements in…

Strengthening Security in Distributed Payment Systems: Explo... March 2024 by Nak Koh

Building on our previous discussion about the pivotal role of Trusted Platform Modules (TPMs) in…

SSL Review: February 2024 March 2024 by Bruce Morton

The Entrust monthly digital certificates review covers a range of topics including news, trends, and…

The Path to 90-Day Certificate Validity: Challenges Facing O... March 2024 by Agnieszka Dyba

Certificate lifespan is getting shorter Over the years the cybersecurity industry has undergone notable transformations…

AI Regulation at a Crossroads March 2024 by Jenn Markey

Ever since ChatGPT debuted in November 2022, the hype and hysteria surrounding artificial intelligence (AI)…

Why an Identity-First Security Strategy Is so Important March 2024 by Rohan Ramesh

With the turn of the 20th century and the rise of the internet, transactions and…

  • Sort by

  • Topic