Preparing for a career in cybersecurity? Check out these statistics

This article includes excerpts from various reports that provide statistics and insights on cybersecurity jobs, skills shortages, and workforce dynamics. Lack of skills and budget slow zero-trust implementation Entrust | 2024 State of Zero Trust &… Continue reading Preparing for a career in cybersecurity? Check out these statistics

Entrust Citizen Identity Orchestration enhances citizen adoption of digital public services

Entrust launched Citizen Identity Orchestration solution. Governments now can streamline the delivery of public services through secure digital identities, embedding trust in every citizen interaction. The innovative and modular solution from Entrust l… Continue reading Entrust Citizen Identity Orchestration enhances citizen adoption of digital public services

Protecting identity in a world of deepfakes and social engineering

In this Help Net Security video round-up, security experts discuss various aspects of identity verification and security, including generative AI’s impact, the state of identity fraud prevention, and the potential impact of identity challenges on… Continue reading Protecting identity in a world of deepfakes and social engineering

How AI-powered attacks are accelerating the shift to zero trust strategies

In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging … Continue reading How AI-powered attacks are accelerating the shift to zero trust strategies

Entrust protects users against fraud, phishing and other account takeover attacks

Entrust announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. By enhancing Entrust… Continue reading Entrust protects users against fraud, phishing and other account takeover attacks

Are organizations moving away from passwords?

Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users… Continue reading Are organizations moving away from passwords?

Balancing AI’s promise with privacy and intellectual property concerns

Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks … Continue reading Balancing AI’s promise with privacy and intellectual property concerns