Relevant Items
Refine Search expand_more
Authentication clear
Blog add
Solutions add
Products add
Product Categories add
150 Results
Mobile Authentication

What can the Equifax and other website breaches teach us about good security habits?

Are there good habits to help web developers build their web sites more securely?  Let’s consider some lessons learned from two recent website breaches.  

How to Do Digital Business Right

A successful digital business strategy requires security AND enablement. If you want to be bold, and offer innovative products, solutions and services, you need to make sure you start by mitigating risks. Establishing trust through digital identity and authentication with advanced capabilities will ensure that you provide a secure foundation for digital business success. And since analyst warn that up to 40 percent of all digital initiatives will fail due to mismanagement of identity-related requirements – we have outlined five fail-proof tactics you can do to increase your chances of digital success.

What type of authentication is best for GDPR compliance?

The renewed focus on privacy prompted by the GDPR provides an opportunity for businesses to rethink how they interact with their users (whether employees, contractors, partners, or customers), pushing the needs of the user to the forefront.

Trusted identities and the Impact of the EU’s General Data Protection Regulation

A significant event will take place next year when a new data protection regime comes into force in Europe, replacing its 20-year-old predecessor. The new regime is called the General Data Protection Regulation (GDPR). 

Among Government And Educational Institutions, A Growing Push Toward Cybersecurity

From the halls of universities to the Oval Office, the issue of cybersecurity is occupying an increasingly central role in everyday life. The major growth in cybersecurity efforts in organizations of all types is undoubtedly due in large part to the havoc that hackers wreaked in 2014. During last year, we got accustomed to seeing new breach headlines every couple of days it seemed like. Hopefully, though, 2015 will be the year we take significant steps toward keeping those attacks at bay. With the work currently being done by educational and government institutions, it looks like preparedness will be the word in 2015.

New Banking Malware Poses Big Threat

When it comes to attacks on enterprise security, few are as powerful or fearsome as malware banking incursions. Because banks are where the real money lies, they also present one of the most lucrative targets for cyberattackers. As a newly emergent strain of banking malware proves, this threat is only becoming greater. Entrust digs deeper to uncover how these connections happen.

Obama's Cybersecurity Initiative - And How It Will Change Enterprise Security

Cybersecurity isn't in the periphery anymore. It's not something you give five minutes of thought to at a corporate meeting and then forget about for the rest of the year. Instead, it's front and center. It's in the headlines. It surrounds us all the time - whether we're reading the newspaper or going to the movies. And now, it's reached the Oval Office.

A Breach Can Happen in an Instant

Oftentimes, this is all it takes for an enterprise security breach to begin. Although the cybercrimes that most frequently make headlines are the ones carried out by fearsome hackers in distant lands, the truth is that all too often security episodes start where you'd least expect them — from the laptop of a trusted employee, or the swiped smartphone of a business executive.

Internet of Things – Beware

Entrust is now moving into the deployment of the Internet of Things (IoT) in an attempt to attach uniquely identifiable devices to the existing Internet infrastructure. The connected devices will allow you to receive better information, control items and, simply, just do fun stuff.

Cybercriminals a Focus of 9/11 Commission's 10-year Report

An update from Entrust on the landscape of cybercrime activity, post 9/11 exploring the nature of current modern terroristic threats. Cybercrime has become so powerful that an attack of devastating magnitude — the Internet equivalent of 9/11 — could not be far off in the future. By implementing enterprise security measures, companies can take a big step toward firming up protection in an age when such defenses cannot be ignored.  
Page 1 of 15