Filter Results expand_more
Digital Business clear
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
318 Results
Blog

By Bruce Morton

August 24, 2016

At Black Hat USA 2016, doctoral candidates Mathy Vanhoef and Tom Van Goethem presented HEIST, an SSL/TLS vulnerability. HEIST is short for “HTTP Encrypted Information can be Stolen through TCP-windows.”
Blog

By Bruce Morton

August 17, 2016

Entrust Datacard's monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON, July 2016.
Blog

By Bruce Morton

August 31, 2016

Google is making security icon changes in the Chrome status bar. The changes are based on a research paper prepared by members of Google and University of California, Berkeley. The research evaluated forty icons, seven complementary strings and surveyed 1,329 people. 
Blog

By Entrust Datacard

January 13, 2016

Last week, Jason Soroko, manager, security technologies for Entrust Datacard was featured by SecureID News as part of their 2016 expert panel. In his article, Jason talked about the importance of multi-factor authentication and how mobile devices are playing a critical role in multi-factor authentication. 
Blog

By Entrust Datacard

January 18, 2016

Top Reasons to Adopt eIDs in 2016 according to cybersecurity experts, Entrust Datacard. 
Blog

By Bruce Morton

January 06, 2016

Entrust Datacard's monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON, December 2015.
Blog

By Entrust Datacard

January 13, 2016

In early 2015, the Washington Post quite accurately referred to 2015 as the "year of the health care hack," and forecast that the situation would continue to escalate. While the data breaches that followed did not quite match the scale of the infamous Anthem and Premera attacks, health care, as predicted, was hit hard. 
Blog

By Entrust Datacard

September 03, 2013

Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on.
Blog

By Jason Soroko

September 04, 2013

The title of this post seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication.
Blog

By Bruce Morton

September 06, 2013

Public Key Pinning was great idea at first. Google used static public keys to protect their websites. In doing so, the keys were embedded in Chrome and were useful in helping users find the DigiNotar attack in 2011, and in a mistaken certification authority (CA) certificate issued by TURKTRUST in 2012.
Page 1 of 32