Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
8 Results for 'Public key infrastructure'
Blog

By Entrust Datacard

August 08, 2013

Twenty years ago, PKI technology was introduced amidst a whirlwind of hype and expectation.
Blog

By Tim Moses

January 29, 2015

As part of our ongoing celebration of the 20th Anniversary of Entrust’s Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.
Blog

By Stephen Demone

January 12, 2018

The plan you need if you are going to evacuate your core security infrastructure should recognize the complexities of the systems, people and things your Public Key Infrastructure is responsible for securing, but should also provide the simplest pathway to achieving an evolved form of security that is better than what you previously had.
Blog

By Sharon Boeyen

April 01, 2015

The World of PKI Standards Public Key Infrastructure (PKI) facilitates security services across a global community of users and across various applications. As such, standards are a key requirement for the success of PKI. This blog covers: What’s in a Standard, X.509 – The Base Standard for PKI, Establishing Trust Among User Communities, The Internet PKI, and Passports & Smartcards.
Blog

By Tim Moses

February 12, 2015

As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In parts one and two, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology. Today we look back at how patent issues and government involvement affected the continued development, access and adoption of PKI.
Blog

By Tim Moses

February 04, 2015

As part of our ongoing celebration of the 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In part one, we traced the early history of PKI and highlighted some of the challenges that led to important technological innovations. Today we look back at how managing symmetric keys in the 1970’s was proving problematic – and how key players forged new solutions for a growing need.
Blog

By Tim Moses

March 05, 2015

As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology thus far. Today we look at the future of PKI and the complexities of creating secure policies and practices that extend beyond borders to protect citizens and data worldwide.
Blog

By Entrust Datacard

June 15, 2015

Back in 1994, Entrust debuted the world's first commercially available public key infrastructure. In the more than 20 years since then, it's been refining and building on the technology. Over the past two decades, enterprise security needs have skyrocketed alongside the growth of connected technology. According to one report from last year, 94 percent of the organizations surveyed reported experiencing cybersecurity issues. These days, a single targeted attack can end up costing an enterprise millions of dollars - and it's not only big corporations and financial institutions that are targeted: From medicine and government entities to small and medium-sized companies, everyone is a target. Across the board, susceptibility to cybercrime has never been higher.
Page 1 of 1