On Oct. 22, industry leaders in the biometric, border security and machine readable travel documents (MRTD) space will gather for…
Entrust’s technology and expertise has long been used in the most advanced, cryptographically secure travel document deployments across the globe….
We always discuss SSL deployment best practices. These are the actions the Web server administrator takes. These are important to discuss,…
Are you an SSL certificate owner that has SSL certificates that protect non-registered domains? What are non-registered domains? Well, let’s…
Online certificate management helps save you time and improves the experience you have with an SSL vendor, but can be…
The Internet Corporation for Assigned Names and Numbers (ICANN) is currently approving many generic top-level domains (gTLDs). What are gTLDs?…
Recently, a form of identity theft known as spear phishing has been making headlines. While the method isn’t new, thieves…
So, Germany’s Chaos Computer Club — which weirdly sounds like an outcast AV group at someone’s high school — claims to have circumvented…
Traditionally, the conversation surrounding identity theft has been focused solely on individuals. In the past, identity theft typically referred to…
First, I would like to than Ivan Ristic for his development of the SSL/TLS deployment Best Practices document. This is…