Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
8 Results for 'Public key infrastructure'
Blog

Public Key Infrastructure (PKI): Evolving in a Mobile Age

By Entrust Datacard
August 08, 2013
Twenty years ago, PKI technology was introduced amidst a whirlwind of hype and expectation.
Blog

In the Beginning—The Information Revolution

By Tim Moses
January 29, 2015
As part of our ongoing celebration of the 20th Anniversary of Entrust’s Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.
Blog

The Simple CA Evacuation Plan You Need

By Stephen Demone
January 12, 2018
The plan you need if you are going to evacuate your core security infrastructure should recognize the complexities of the systems, people and things your Public Key Infrastructure is responsible for securing, but should also provide the simplest pathway to achieving an evolved form of security that is better than what you previously had.
Blog

Evolving PKI Standards

By Sharon Boeyen
April 01, 2015
The World of PKI Standards Public Key Infrastructure (PKI) facilitates security services across a global community of users and across various applications. As such, standards are a key requirement for the success of PKI. This blog covers: What’s in a Standard, X.509 – The Base Standard for PKI, Establishing Trust Among User Communities, The Internet PKI, and Passports & Smartcards.
Blog

Patents, Key Escrow and the Elliptic Curve

By Tim Moses
February 12, 2015
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In parts one and two, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology. Today we look back at how patent issues and government involvement affected the continued development, access and adoption of PKI.
Blog

Public-Key Solves Half of the Key Distribution Problem

By Tim Moses
February 04, 2015
As part of our ongoing celebration of the 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In part one, we traced the early history of PKI and highlighted some of the challenges that led to important technological innovations. Today we look back at how managing symmetric keys in the 1970’s was proving problematic – and how key players forged new solutions for a growing need.
Blog

What’s Next for PKI?

By Tim Moses
March 05, 2015
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology thus far. Today we look at the future of PKI and the complexities of creating secure policies and practices that extend beyond borders to protect citizens and data worldwide.
Blog

The Virtues of PKI for Business Networks

By Entrust Datacard
June 15, 2015
Back in 1994, Entrust debuted the world's first commercially available public key infrastructure. In the more than 20 years since then, it's been refining and building on the technology. Over the past two decades, enterprise security needs have skyrocketed alongside the growth of connected technology. According to one report from last year, 94 percent of the organizations surveyed reported experiencing cybersecurity issues. These days, a single targeted attack can end up costing an enterprise millions of dollars - and it's not only big corporations and financial institutions that are targeted: From medicine and government entities to small and medium-sized companies, everyone is a target. Across the board, susceptibility to cybercrime has never been higher.
Page 1 of 1