Relevant Items
Refine Search expand_more
SSL clear
Blog add
Solutions add
Products add
Product Categories add
166 Results

SSL Review: December 2016

Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry.
Digital Certificates

2017 Looking Back, Moving Forward

Vulnerabilities, Requirements for Code Signing Certificate, Certification Authority Authorization (CAA) Standards
Digital Certificates

Bye Bye SHA-1

Entrust Datacard Stops Issuing SHA-1 Certificates

SSL Review: March 2017

Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. 
Digital Certificates

Recent Attack Underscores Need for EV SSL/TLS Certificates

EV certificates display the site owner’s name in the browser status bar. This assures website visitors that the website is authentic and that they are on the intended site. This unique status bar is only displayed for brand’s protected with an EV certificate. They are designed specifically to mitigate attacks by letting users know the website can be trusted.

Bad Actors Catalyst Behind New Standards for Code Signing

Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s identity, and provides integrity by guarantying the software has not been altered since it was signed. Minimum Requirements for Code Signing will increase Internet security by setting a new bar to prevent private keys from being compromised. The requirements will also provide a better mechanism to have code signing certificates revoked limiting the proliferation of malware. The result will benefit application software suppliers, online businesses, and of course, software users globally.

SSL Review: January 2017

Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry.

Secure Industrial Control Systems

OT/IT Convergence and the Need for Secure Device Ecosystems OT has been around a long time and has specific needs and constraints. ICS systems are indeed under attack and there is a need for comprehensive security. Security based on managed identities should be an important part of a defense-in-depth strategy in ICS. Uniquely identifying, authenticating, authorizing those devices and securing the data are ideas that are shared by federal guidance and international regulation. When choosing a partner to help secure your industrial control systems, seek a long term partner who understands the unique needs of OT environments. You can find out more about how we are helping to secure the industrial IoT ecosystem by viewing our infographic.

Telcom Industry and IoT: From ‘Can You Hear Me Now’ to Secure Service Delivery

What are the characteristics of a security solution that can address the challenges facing telecoms in their bid to capture market share of IoT projects? From a technical standpoint, the security solution needs to provide data integrity from device to the enterprise data hub. IoTrust is a security platform addressing the above challenges and can help bring your IoT product to market faster and more securely.

SHAttered - First SHA-1 Collision

Google and CWI announced SHAttered, an attack on the SHA-1 cryptographic hash function. The attack was demonstrated by allowing the cryptographic signature on a good PDF to be the same as on a bad PDF. In other words, they forged the signature.
Page 1 of 17