Filter Results expand_more
PKI clear
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
44 Results
Blog

By Entrust Datacard

August 17, 2016

Securing data in transit is essentially securing data as it passes over a network. The challenge here is that the IP suite is full of protocols – HTTP, FTP and Telnet, to name a few of the most commonly used ones – that transmit data in plaintext, which means that there is the possibility of someone monitoring or intercepting messages and being able to read their contents. 
Blog

By Bruce Morton

September 06, 2013

Public Key Pinning was great idea at first. Google used static public keys to protect their websites. In doing so, the keys were embedded in Chrome and were useful in helping users find the DigiNotar attack in 2011, and in a mistaken certification authority (CA) certificate issued by TURKTRUST in 2012.
Blog

By Entrust Datacard

September 17, 2013

The Washington Post and other media outlets have provided extensive coverage of allegations made by Edward Snowden concerning some of the NSA's surveillance programs.
Blog

By Entrust Datacard

January 21, 2013

In 2011, Google added public key pinning to Chrome. They white-listed the certification authority public keys that could be used to secure Google domains.
Blog

By Entrust Datacard

August 06, 2013

A balanced relationship must exist between governments that require personal information from citizens entering their country and citizens who are willing to give up this information.
Blog

By Entrust Datacard

August 08, 2013

Twenty years ago, PKI technology was introduced amidst a whirlwind of hype and expectation.
Blog

By Bruce Morton

December 19, 2013

A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

By Entrust Datacard

May 20, 2015

If you have ever read even a little bit of cybersecurity news, you're bound to hear terms like "virus," "malware," "spyware," and "DDoS attack" thrown around with some frequency. The terms can quickly blur together, and it can become difficult to differentiate between them. Yet businesses operating today need to be able to make distinctions between all the threat types out there, since each and every one poses a unique risk to enterprises. Unfortunately, many business IT departments are not prioritizing cybersecurity at all, let alone setting aside time to learn about the separate threat types that exist. The lack of a proactive cybersecurity strategy within many businesses is not just problematic — it also plainly does not make sense.
Blog

By Sandra Carielli

July 13, 2018

Small remote offices often present challenges to IT and IT Security professionals. This is where PKI can be more than a nice to have – it can be a business enabler and necessity.
Blog

By Michelle Morgan-Nelsen

March 07, 2018

In less than six weeks, our digital identity evangelists will descend on the Moscone Center in San Francisco for one of the world’s largest security events: RSA Conference 2018.
Page 1 of 5