Back in the 1990s, asymmetric cryptography and Public Key Infrastructure (PKI) using x.509 certificates was…
Back in the 1990s, asymmetric cryptography and Public Key Infrastructure (PKI) using x.509 certificates was…
Almost fifteen years ago, I was teaching classes in application security at a large financial…
Opinions vary widely concerning the significance of blockchain technology. Some commentators compare its potential impact…
A few years ago, identity was all about me. No, I’m not a narcissist –…
As discussed in our first Digital DNA series blog post, organizations are recognizing opportunity and driving…
Over the past year or so, I’ve had the luxury of working with a group…
Cryptography was originally developed to secure communications, i.e., data in transit (alternatively, data in motion)….
Organizations in certain sectors, including health care and government, seem to walk around with bull’s-eyes…
As cybersecurity researchers and law enforcement agencies alike have been working to invent new ways…
Back in 1994, Entrust debuted the world’s first commercially available public key infrastructure. In the…