Cybersecurity Institute
Blog Articles
Navigating the Complex Web of Identity and Artificial Intelligence in 2024
December 2023 by Jordan Avnaim
As another year draws to a close, it’s time to start thinking about what trends and challenges may face us in 2024. Next year promises to be a pivotal moment in the evolution of identity management and the integration of artificial intelligence (AI).
Navigating the Nexus: Unraveling Cybersecurity Threats to Artificial Intelligence
November 2023 by Dr. Pali Surdhar
In the digital age, the symbiotic relationship between artificial intelligence (AI) and cybersecurity is undeniable. As AI technologies advance, so do the methods and tactics employed by malicious actors seeking to exploit vulnerabilities.
AI: the Double-edged Sword for Today’s Banker
October 2023 by Jenn Markey
It seems you can’t go anywhere today without artificial intelligence (AI) creeping into the conversation. Billed by some as being as, or potentially more disruptive than the internet, AI and machine learning (ML) are laying the foundation for the next digital age, whether we’re ready or not.
Generative AI Security Challenges – Fighting Fire With Fire
September 2023 by Greg Wetmore
Generative AI has emerged as a transformative force. These advanced large language models can autonomously create content ranging from text to images and even music, offering unprecedented capabilities for creativity and innovation.
NIST Delivers the Draft Standards for Post-quantum Cryptography
August 2023 by Samantha Mabey
The starting whistle has gone off in the race for quantum-safe cryptography solutions. Last week, the National Institute of Standards and Technology (NIST) released their draft standards for post-quantum cryptography (PQC).
Governments Across the Globe Are Looking to Prepare for and Mitigate the Quantum Threat
August 2023 by Samantha Mabey
While there’s never been doubt about the importance of digital security, over the last few years it seems to have garnered a lot more attention – specifically by governments across the globe.
NIST Standards for Post-quantum Cryptography Are Coming Soon. What Does This Mean for Enterprises?
July 2023 by Greg Wetmore
With many countries all over the world launching strategic funding programs and the largest technology companies leading development efforts, the threat of quantum computers to cryptography is not a matter of “if”, but “when.”
Zero Trust is More Than a Slogan
May 2023 by Bhagwat Swaroop
When it comes to Zero Trust, the conversation has moved from being a nebulous term several years ago to a well-understood framework with a true north that has broad acceptance across the cybersecurity industry.
An Approach to Resolving PKI Talent Scarcity
March 2023 by Ngook Kong
Every year, the Ponemon Institute surveys more than 2,500 IT leaders who are immersed in PKI management at an enterprise level.
Tokenization: Enabling the Intersection of Data Security and Exceptional User Experiences
March 2023 by Nicolas Bruley
Tokenization in the financial card space is not new. Generally speaking, the technology was first applied to electronic payments...
Unreleased findings from the Entrust Cybersecurity Institute's "Future of Identity" Report
March 2023 by Jenn Markey
Younger consumers - especially Gen Z - value the promise of simplified experiences that digital identities bring...
3 key insights from the Entrust Cybersecurity Institute's "Future of Identity" Report
March 2023 by Jenn Markey
We surveyed 1,450 consumers globally to understand how they feel about emerging identity topics — here's what we found.
Regarding Open Source Security Vulnerabilities: Focus on Changing Human Behaviors
February 2023 by Greg Wetmore
Like all humans, coders aren't perfect. They're vulnerable, which means the software they create is vulnerable as well.
Want to Finally Achieve Zero Trust? Apply the Power of Entitlement Management.
February 2023 by Tushar Tambay
The enterprise world has firmly embraced the desire to move to Zero Trust. Actual implementation, however, is another matter.
Top 5 Cybersecurity Predictions for 2023
December 2022 by Anudeep Parhar & Mark Ruchie & Greg Wetmore
The cybersecurity arms race is accelerating. That's the clear lesson of 2022 for those of us committed to protecting organizations...
Decentralized Identity: Time for CIOs and CISOs to Make it Happen
June 2022 by Greg Wetmore
We're in the midst of an identity crisis. Whenever we log in from our kitchen tables or conduct transactions through a bank...
Russia is hacking Ukraine's infrastructure. How does that affect my enterprise?
May 2022 by Mark Ruchie
While nearly every organization is under constant attack, Russia's invasion of Ukraine adds an important new dimension...
Responding to the Log4j vulnerability, and anticipating the next crisis
December 2021 by Mark Ruchie
On December 10, the world found out that a recent version of a seemingly innocuous open-source logging application called...