Filter Results expand_more
Authentication clear
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
165 Results
Blog

By Entrust Datacard

August 17, 2016

Securing data in transit is essentially securing data as it passes over a network. The challenge here is that the IP suite is full of protocols – HTTP, FTP and Telnet, to name a few of the most commonly used ones – that transmit data in plaintext, which means that there is the possibility of someone monitoring or intercepting messages and being able to read their contents. 
Blog

By Entrust Datacard

August 19, 2016

Health care organizations face unique security challenges, stemming from the sensitive data they regularly work with, the appetite of cybercriminals for this information, and the difficulties of fending off breaches while also wrangling with issues such as patient identity fraud. 
Blog

By Bruce Morton

August 25, 2016

Details surrounding the SWEET32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN can be found in the paper released by Karthikeyan Bhargavan and Gaëtan Leurent from INRIA in France. The paper shows that cipher suites using 64-bit block length ciphers are vulnerable to plaintext recovery attacks. As such, Triple-DES (3DES) and Blowfish are vulnerable. Here’s an overview.
Blog

By Entrust Datacard

January 13, 2016

Last week, Jason Soroko, manager, security technologies for Entrust Datacard was featured by SecureID News as part of their 2016 expert panel. In his article, Jason talked about the importance of multi-factor authentication and how mobile devices are playing a critical role in multi-factor authentication. 
Blog

By Entrust Datacard

January 18, 2016

Top Reasons to Adopt eIDs in 2016 according to cybersecurity experts, Entrust Datacard. 
Blog

By Entrust Datacard

January 13, 2016

In early 2015, the Washington Post quite accurately referred to 2015 as the "year of the health care hack," and forecast that the situation would continue to escalate. While the data breaches that followed did not quite match the scale of the infamous Anthem and Premera attacks, health care, as predicted, was hit hard. 
Blog

By Entrust Datacard

January 07, 2016

Shadow IT can be loosely defined as the incorporation of any information technology introduced into an organization that is not necessarily approved by management. 
Blog

By Entrust Datacard

September 03, 2013

Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on.
Blog

By Jason Soroko

September 04, 2013

The title of this post seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication.
Blog

By Entrust Datacard

September 04, 2013

As organizations and individuals continue to look for ways to ensure the security of digital information and move away from a world of passwords, one option that has been tossed around for several years includes the collection and analysis of specific human body characteristics. Eye retina scans, fingerprints and voice samples are all examples of a type of security system commonly referred to as biometrics.
Page 1 of 17