Skip to main content
FEATURED POST

Preventing Hyperjacking in a virtual environment

READ POST

sitting woman in yellow top holding credit card and tablet

Most recent posts

Do you have Cryptographic Agility? March 2023 by Ian Wills

There is a consensus across industry and governments that organizations should start planning how they will maintain security of IT systems and data given likely advances in quantum computing.  Going forward, our cryptographic estates are likely to be less stable,…

Tokenization: Enabling the Intersection of Data Security and Exceptional User Experiences March 2023 by Nicolas Bruley

Tokenization in the financial card space is not new. Generally speaking, the technology was first applied to electronic payments in the late 1990s. However, trends in e-commerce and data privacy, along with the relentless evolution of hacking methodologies and technologies,…

Entrust Software Security Architect Recognized as an Excellence Award Finalist by Microsoft March 2023 by Cindy Provin

It’s with great pride that we announce our colleague Mike Ounsworth has been named an award finalist in the Microsoft Security Excellence Awards 2023 in the category of Security Changemaker. This is the fourth year Microsoft is recognizing partners for…

Unreleased findings from the Entrust Cybersecurity Institute’s “Future of Identity” Report March 2023 by Jenn Markey

Younger consumers – especially Gen Z – value the promise of simplified experiences that digital identities bring The Future of Identity report from the Entrust Cybersecurity Institute explores global consumers’ attitudes toward three emerging identity topics: passwordless authentication, hybrid identities,…

VIEW ALL POSTS

All Topics

All Contributors