Search Results 4954 ITEMS
5 Last-Minute Security Steps Retailers Can Take Right Now
Whether it's wrapping up a work project, or the presents, the 2015 holiday season will have many people scrambling to finish last-minute tasks. This m...
Trust anchors in the Azure cloud
OK, I’m biased, but it’s hard to argue that crypto isn’t a critical enabler of trust in a digital world. Whether that trust is focused on confidential...
Will Passwords be Replaced with Stronger Authentication?
Identity management and authentication have long been a core aspect of information security. So let’s assume that “better authentication” means somet...
National Cybersecurity Agency Will Be Launched
The need to defend against cybercrime extends all the way to our nation's capital - but our government seems to be up to the challenge.According to U....
Patents, Key Escrow and the Elliptic Curve
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the p...
Public-Key Solves Half of the Key Distribution Problem
As part of our ongoing celebration of the 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneer...
20 Years of PKI and Secure Transactions
Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which represen...
Private Trust and Proxies
With the news of Superfish, Komodia and PrivDog , there has been some interesting discussion on private trust and HTTPS proxies.Private TrustBy privat...
What Happened with Live.fi?
Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Micr...
As Global Data Loss Rises, Companies Must Rise To Challenge
Defending your enterprise against a cyberattack today is harder than it has ever been before. These days, hackers operate with a huge degree of sophis...
Filter Results
Product Categories