Back to the future of hardware security modules
In a scene from the 1980s hit movie Back to the Future, Marty (played by... The post Back to the future of hardware security modules appeared first on Entrust Blog ... Read More

Chocolate vs Vanilla? We’ve all heard that before. But what about symmetric vs asymmetric?
Chocolate or vanilla is a familiar question we are often asked. Whether its cake, ice cream, or some other sweet,... The post Chocolate vs Vanilla? We’ve all heard that before. But what about symmetric vs asymmetric? appeared first on Entrust Blog ... Read More

Why You Need a Root of Trust to be an eIDAS Trust Service Provider
We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions,... The post Why You Need a Root of Trust to be an eIDAS Trust Service Provider appeared first on Entrust Blog ... Read More
Are you the keymaster?
If you grew up in the 80s, you will remember the line: “Are you the keymaster?” from the original Ghostbusters... The post Are you the keymaster? appeared first on Entrust Blog ... Read More
Partly cloudy with scattered precipitation and isolated storms
Television weather reporters are often made fun of when their forecast calls for partly cloudy skies with scattered precipitation and... The post Partly cloudy with scattered precipitation and isolated storms appeared first on Entrust Blog ... Read More

Signed, Sealed, Delivered! Code Signing Makes Software Yours
In “Signed, Sealed, Delivered,” Stevie Wonder sings “You’ve got the future in your hand — signed, sealed, delivered, I’m yours.”... The post Signed, Sealed, Delivered! Code Signing Makes Software Yours appeared first on Data Security Blog | Thales eSecurity ... Read More

To Make the Internet of Things Safe, Start with Manufacturing
Vincent Van Gogh is believed to have said “Great things are … done … by a series of small things... The post To Make the Internet of Things Safe, Start with Manufacturing appeared first on Data Security Blog | Thales eSecurity ... Read More

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy
This article was originally featured as a guest post on Venafi’s blog. Thales eSecurity and Venafi are technology partners. One... The post Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy appeared first on Data Security Blog | Thales eSecurity ... Read More

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke appeared first on Data Security Blog | Thales e-Security ... Read More

Leopard Spots and Zebra Stripes: Big Data and Identity Management
The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not... The post Leopard Spots and Zebra Stripes: Big Data and Identity Management appeared first on Data Security Blog | Thales e-Security ... Read More