The Identity Thread by Entrust
Episodes
Know Your Employee: Securing the Workforce Against Fraud, Impersonation & Insider Threats
20 Mar 2026
Contributed by Lukas
As remote work and global hiring become standard, the enterprise faces a new crisis: the infiltration of fraudulent identities into the trusted workfo...
Why Identity Centric Security Is Essential
24 Feb 2026
Contributed by Lukas
In this special inaugural episode of the Identity Thread Podcast by Entrust, we sit down with incoming Entrust CEO Tony Ball to explore why identity s...
The Quantum Countdown and the Future of Encryption
11 Feb 2026
Contributed by Lukas
At the dawn of 2026, the post quantum (PQ) era has effectively arrived with “harvest now, decrypt later” style attacks and the availability of NIS...
The Identity Shift: Lessons from 2025, Predictions for 2026
19 Dec 2025
Contributed by Lukas
2025 was characterized by an exponential increase in the use of AI to both perpetrate and defend against fraud. But in 2026, fraud won’t just be abo...
How Do We Rebuild Trust in the Face of Changing Fraud?
02 Dec 2025
Contributed by Lukas
Fraud today is evolving – and fast. From deepfakes to synthetic identities, attackers are adapting and using AI and automation to exploit vulnerabil...
Building Trust in the Public Sector
28 Oct 2025
Contributed by Lukas
Securing the public sector is more than protecting systems and data – it's about protecting the trust between the governments and the citizens they ...
Mastering Your Cryptographic Sprawl
26 Sep 2025
Contributed by Lukas
Cryptographic assets, including encryption keys, certificates, and tokens, are a critical layer of modern cybersecurity. These tools are essential for...
Crossing the Digital Identity Divide: Trust and Interoperability in Action
25 Aug 2025
Contributed by Lukas
Digital identity underpins modern cybersecurity and citizen empowerment. Yet governments around the world are moving at different speeds and in differ...
The Trust Paradox Part 2: Biometrics, Regulation & Outpacing Fraud
14 Aug 2025
Contributed by Lukas
As financial transactions become increasingly digital, the demand for seamless user experiences often clashes with the need for robust security measur...
Tap to Trust: The Trust Paradox in Payments Security
25 Jul 2025
Contributed by Lukas
Digital payments are becoming the norm, raising the stakes for security and trust. With rising threats from AI-driven fraud and growing pressure for s...
Secure Borders, Happy Travelers
20 Jun 2025
Contributed by Lukas
As summer approaches, millions of people are preparing to hit the skies, roads and seas. Government agencies around the globe are bracing for this inf...
Thriving, not just surviving, in financial services
23 May 2025
Contributed by Lukas
Technology is reshaping financial services. AI-powered synthetic identities and deepfakes are propelling fraudsters to new heights, while quantum comp...
Live from RSAC 2025: Top Trends and Takeaways
19 May 2025
Contributed by Lukas
In this special edition podcast episode, we are bringing our audience insights from the biggest event in cybersecurity: RSAC 2025. While at the confer...
The Race to Re-encrypt the World Before Q-Day: Your Top Questions Answered
24 Apr 2025
Contributed by Lukas
In this podcast, we’ll delve into the key cybersecurity challenges associated with the arrival of Q-Day, what is needed to attain and maintain a Zer...
Critical Infrastructure Cybersecurity & Resilience
25 Mar 2025
Contributed by Lukas
From energy and wastewater treatment to communications, banking, and beyond, critical infrastructure are those assets, systems, and networks that supp...
Navigating the Global Compliance Landscape
24 Feb 2025
Contributed by Lukas
Driven by technology innovation, divergent regulatory philosophies across geographies, and different industry dynamics, the global regulatory landscap...
The Future of Payments and Identity
10 Feb 2025
Contributed by Lukas
At the outset of 2025, there is a natural convergence of payments and identity happening that is transforming the consumer and citizen experience. Cen...
The year ahead in cyber – AI, Quantum Computing, Identity, and so much more
12 Dec 2024
Contributed by Lukas
Among many other milestones, 2024 was the year generative AI went mainstream, identity fraud went digital first, and the first post quantum cryptograp...
Cybercrime’s Amateur Hour is Over
22 Nov 2024
Contributed by Lukas
In this episode of the Entrust Cybersecurity Institute Podcast, we delve into the evolving landscape of cybercrime, highlighting how advancements in t...
The Dawn of the Post-Quantum Era
22 Oct 2024
Contributed by Lukas
Quantum computing will revolutionize industries and break conventional encryption, threatening the world’s digital economy and upending global power...
Impact of AI, biometrics, and quantum computing on the future of identity
17 Sep 2024
Contributed by Lukas
Identity is essential to accessing education, employment, financial services, and much more. But, with disruptive technology forces like AI, biometric...
Playback: The Evolution of PQC, from Research to Standardization
28 Aug 2024
Contributed by Lukas
In light of NIST's recent PQC standards, we revisit our conversation with Brian LaMacchia, a cryptography expert and former Microsoft engineer, on the...
Ditch Your Passwords: The FIDO Alliance's Vision for Online Security
23 Jul 2024
Contributed by Lukas
What if you could ditch your passwords and still have a secure and seamless online experience? That's the vision of the FIDO Alliance, a group of indu...
Journey to Post-Quantum Preparedness
19 Jul 2024
Contributed by Lukas
In this "boots to the ground" podcast episode, Samantha Mabey is joined by Tom Patterson, Quantum Security Global Lead at Accenture, to discuss some o...
Trusted Citizen Identities Fuel Government Digital Transformation
20 Jun 2024
Contributed by Lukas
In this podcast, we’ll delve into some of the opportunities, risks, and differing approaches to digital government around the globe, including the r...
Live from RSAC: The Dark Side of Generative AI
21 May 2024
Contributed by Lukas
In this podcast episode we look at the dark side of generative AI – the destructive ways criminals are utilizing it to create deepfakes, optimizing ...
Flash Points in AI and Biometrics
24 Apr 2024
Contributed by Lukas
The use of biometrics has become a flash point for discussion in efforts to regulate AI around the globe. While different biometric use cases present ...
AI Regulation at a Crossroads
25 Mar 2024
Contributed by Lukas
This podcast examines the raging debate around not only if and how to regulate AI, but also when and by whom. Our experts cover such topics as the pot...
Hiding in Plain Sight - Uncovering Cybersecurity's Hidden Risks
26 Feb 2024
Contributed by Lukas
In this episode, our guests Samantha Mabey, Entrust Director of Digital Security Solutions, and Tushar Tambay, VP of Product Development at Entrust, u...
2024 Predictions
24 Jan 2024
Contributed by Lukas
AI, quantum computing, digital identities, and regulation were hot topics in 2023 and will continue to evolve and increase in focus in the coming year...
Reflecting on 2023 Predictions – What We Got Right and Wrong
01 Dec 2023
Contributed by Lukas
Last year we made three predictions about what would happen in the world of cybersecurity. How did we do? Join host Ken Kadet and guests Anudeep Parha...
Threats to Artificial Intelligence
10 Nov 2023
Contributed by Lukas
The world is relying more on artificial intelligence to improve the way we do business, serve citizens, and live our lives. How can we protect AI from...
Fight Deepfakes, Synthetic Identities and Fraud in Banking
20 Oct 2023
Contributed by Lukas
Deepfakes and synthetic identities are posing a threat to banks and financial organizations – organizations that are required to “know your custom...
How AI Will Impact Enterprise Security
28 Sep 2023
Contributed by Lukas
AI has started an arms race in cybersecurity. Will this continue to escalate or is AI just the latest tool where winning requires an ongoing state of ...
CISA’s Strategic Plan - what Enterprises can Learn
23 Aug 2023
Contributed by Lukas
CISA's (Cybersecurity and Infrastructure Security Agency’s) strategic plan was just recently released and focuses on four key areas: cyber defense, ...
War for the Wallet
19 Jul 2023
Contributed by Lukas
What’s next in the war for the wallet, and how do you win? What can big banks, big tech, and big financial institutions learn from each other? Join ...
The Evolution of PQC, from Research to Standardization
18 Jul 2023
Contributed by Lukas
In this podcast episode, host Samantha Mabey talks to Brian LaMacchia, President of FARCASTER Consulting Group and former Distinguised Engineer for Cr...
Post Quantum Series Episode 2: The Impact of Post-Quantum Cryptography on Constrained Devices
27 Jun 2023
Contributed by Lukas
In this special post-quantum episode, guest host, Samantha Mabey, speaks with Dr. Sarah McCarthy, cryptographic strategist at evolutionQ and an affili...
Phishing, AI, Zero Trust
22 Jun 2023
Contributed by Lukas
Entrust experts Mark Ruchie, Rishi Kaushal, and Greg Wetmore take on the evolution of phishing in our June Cybersecurity Institute podcast, going deep...
Building the Foundations for Zero Trust
19 May 2023
Contributed by Lukas
Entrust experts Mark Ruchie, Rishi Kaushal and Greg Wetmore talk about the building blocks of a robust Zero Trust framework, the CISA maturity model a...
Post-Quantum Series Episode 1: The Road to PQ Preparedness
24 Apr 2023
Contributed by Lukas
In this special post-quantum episode, guest host, Samantha Mabey, speaks with Sandy Carielli, Principal Analyst at Forrester, for her insights on the ...
The Future of Identity: Balancing Security and Convenience
20 Mar 2023
Contributed by Lukas
In today's digital age, identity has become a powerful and valuable commodity. But who owns it, and how can we protect it? Join us in this episode of ...
Artificial Intelligence
02 Feb 2023
Contributed by Lukas
Has artificial intelligence (AI) finally arrived in software development? What are the implications for cybersecurity and the way organizations do bus...
2023 Predictions
06 Dec 2022
Contributed by Lukas
The cybersecurity arms race is accelerating. That’s the clear lesson of 2022 for those of us committed to protecting organizations from the perils o...
Quantum Computers: The Cryptographer’s Perspective
16 Sep 2022
Contributed by Lukas
We talk with renowned quantum academic Dr. Michele Mosca, deputy director of the Institute for Quantum Computing, and founder and CEO of evolutionQ, a...
The State of Quantum Computers
08 Jul 2022
Contributed by Lukas
What is the current state of quantum computers, and what developments can we expect in the coming years? We talk with Richard Moulds, General Manager ...
Quantum Technology and Key Generation
15 Jun 2022
Contributed by Lukas
We interview Duncan Jones, head of cybersecurity at Cambridge Quantum Computing, part of Quantinum, on the potential of quantum computers today, crypt...
Protect vs Detect
08 Jun 2022
Contributed by Lukas
Every time you see a big cybersecurity crisis or incident -- like Colonial Pipeline, Solar Winds, log4j -- leaders and Boards rush out to invest more...
Post-Quantum and the Impact on Blockchain
30 May 2022
Contributed by Lukas
How will quantum computing impact security of the blockchain? Blockchain expert Jon Geater, Chief Product & Technology Officer at RKVST and Pali S...
Introduction to Quantum Computing and Post-Quantum Cryptography (PQC)
17 May 2022
Contributed by Lukas
Host Samantha Mabey speaks with Greg Wetmore, Entrust VP of Software Development to offer a gentle introduction to quantum computing, the post-quantum...
The Science Behind Quantum Computers
17 May 2022
Contributed by Lukas
Host Samantha Mabey interviews award-winning quantum physicist and CEO of Nu Quantum, Dr. Carmen Palacios-Berraquero on the science of quantum computi...
Cyberwar in Ukraine: What it means for the enterprise
10 May 2022
Contributed by Lukas
There’s no bigger story right now than the Russian war in Ukraine. And without putting aside the daily human tragedy … it’s also a cyberwar…on...