Protecting the EU’s critical infrastructure from cyberattacks in a changing environment

The critical infrastructure is commonly defined as the systems and networks that provide basic services... The post Protecting the EU’s critical infrastructure from cyberattacks in a changing environment appeared first on Entrust Blog ... Read More

Back to the future of hardware security modules

In a scene from the 1980s hit movie Back to the Future, Marty (played by... The post Back to the future of hardware security modules appeared first on Entrust Blog ... Read More
Symmetric Encryption illustration

Chocolate vs Vanilla? We’ve all heard that before. But what about symmetric vs asymmetric?

Chocolate or vanilla is a familiar question we are often asked. Whether its cake, ice cream, or some other sweet,... The post Chocolate vs Vanilla? We’ve all heard that before. But what about symmetric vs asymmetric? appeared first on Entrust Blog ... Read More
Cloud Signing Service

Why You Need a Root of Trust to be an eIDAS Trust Service Provider

We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions,... The post Why You Need a Root of Trust to be an eIDAS Trust Service Provider appeared first on Entrust Blog ... Read More

Are you the keymaster?

If you grew up in the 80s, you will remember the line: “Are you the keymaster?” from the original Ghostbusters... The post Are you the keymaster? appeared first on Entrust Blog ... Read More

Partly cloudy with scattered precipitation and isolated storms

Television weather reporters are often made fun of when their forecast calls for partly cloudy skies with scattered precipitation and... The post Partly cloudy with scattered precipitation and isolated storms appeared first on Entrust Blog ... Read More
Signed, Sealed, Delivered! Code Signing Makes Software Yours

Signed, Sealed, Delivered! Code Signing Makes Software Yours

| | Data Security
In “Signed, Sealed, Delivered,” Stevie Wonder sings “You’ve got the future in your hand — signed, sealed, delivered, I’m yours.”... The post Signed, Sealed, Delivered! Code Signing Makes Software Yours appeared first on Data Security Blog | Thales eSecurity ... Read More
To Make the Internet of Things Safe, Start with Manufacturing

To Make the Internet of Things Safe, Start with Manufacturing

Vincent Van Gogh is believed to have said “Great things are … done … by a series of small things... The post To Make the Internet of Things Safe, Start with Manufacturing appeared first on Data Security Blog | Thales eSecurity ... Read More
Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

| | Data Security
This article was originally featured as a guest post on Venafi’s blog. Thales eSecurity and Venafi are technology partners. One... The post Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy appeared first on Data Security Blog | Thales eSecurity ... Read More
Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

| | Data Security
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke appeared first on Data Security Blog | Thales e-Security ... Read More