If you’re having trouble getting a handle on your cryptographical instances, you’re not alone. According to Ponemon Institute’s most recent…
Only 100 days have past since BIMI first launched and it’s clear that early adopters see brand value in displaying…
Email continues to be a popular way for brands to communicate with their customers. And with no signs of slowing…
Cryptography is everywhere. It has become an integrated layer of defense within all of the digital transformation initiatives now collectively…
An exponential growth in cryptographic instances has increased complexity. But, when cryptography is done right, it can reduce the threat…
Cryptography plays a significant role in any digital service because it is the foundation for securing an organization’s most critical…
Your business’s critical infrastructure most likely relies on several systems across your digital environment. Whatever those systems may be, there…
Digital business is here, with the proliferation of new tools and processes such as DevOps, Cloud, hybrid cloud, multi-cloud, and…
Those working in the trenches of TLS/SSL technology have first-hand experience with the rapid-fire pace of policy changes meant to…
As a certification authority (CA), what we do at Entrust Datacard sits right in the crosshairs of Dev and Ops….
Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to…
New regulations surrounding consumer banking transactions in the European Union (EU) can seem onerous for all financial services institutions that…
Changes are expected in the way extended validation (EV) certificates will be indicated in upcoming releases of major browsers, Google…
If you were asked how many SSL/TLS and digital signing certificates your organization is using for data encryption, would you…
Essentially an SSL/TLS certificate is a form of digital identity for your website. The level of identity differs depending on…
You’re probably not going to select dress shoes to wear to the gym. In a similar way, the SSL/TLS certificate…
Building an SSL/TLS certificate is as easy as one-two-three-four-five. Determine the number of domains that need to be secured. This…
We can expect that the term Subject Alternative Name (SAN) will likely not make the list of top 10 annoying…
A certificate signing request or CSR is the first step toward building an SSL/TLS certificate. It’s a chunk of encoded…
Apple will join leading browser Google Chrome in enforcing a Certificate Transparency policy for all public SSL/TLS certificates issued after October 15,…
As Google’s plan to move the entire web to HTTPS by default draws near, your website needs to be fully…
The Point of No Return for HTTPS Arrives in the Google Chrome 68 Release Expected in July 2018 Google has…
First impressions are lasting ones. That’s why you want to make sure that there’s nothing standing between your visitors and…
Combat the Latest Online Shopping Threats You better watch out! Cybercriminals are hard at work prying personal information in new…
Ensuring Transaction Security Don’t let a cyber scam spoil your holiday cheer. Cyber criminals work daily to craft new ways…