Relevant Items
Refine Search expand_more
Government clear
Blog add
Solutions add
Products add
Product Categories add
30 Results

Obama's Cybersecurity Initiative - And How It Will Change Enterprise Security

Cybersecurity isn't in the periphery anymore. It's not something you give five minutes of thought to at a corporate meeting and then forget about for the rest of the year. Instead, it's front and center. It's in the headlines. It surrounds us all the time - whether we're reading the newspaper or going to the movies. And now, it's reached the Oval Office.

Airports, Other Critical Infrastructure Present Lucrative Attacker Target

The issue airport breach points have begun to point to a greater need for enhanced data security. The need for critical infrastructure protection came into stark focus with the recent news that 75 airports fell victim to malicious intruders. This large-scale attack calls much-needed attention to the necessity of firming up cyber security in places like these. 

Taking a Holistic Approach for Government ID Card Programs

Entrust's industry experts breaks down the common misconceptions regarding print technologies as well as highlights other important factors to be considered for your program—such as card designs, card stock and laminates or secure overlays—to ensure you are making the best decision for your investment.

The Leading Edge of Border Security

In an increasingly global market, people everywhere are moving freely across borders and around the globe at a rapid rate. In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. Another all-time high was set in 2013, and we’re on pace to break that record again. In the past decade, technology advancements have transformed consumer expectations.

ePassports Proving to be a Widespread Method of Border Control

3 Reasons To Ditch Your Old Passport For An e-Passport

As cybersecurity researchers and law enforcement agencies alike have been working to invent new ways to prevent cybercrime and identity theft, myriad new technologies have been created to try and combat the problem. But recently, one has started to rise above the rest. Biometrics are not a new concept, but until recently remained within the domain of top secret spy movies and major corporations protecting billion dollar assets.

How Law Enforcement Can Guarantee CJIS Compliance

Intelligence is perhaps the single greatest tool in the fight against crime. Look at any major criminal incident brought to justice and you can be almost certain outside intelligence played a pivotal role. In the wake of the Boston marathon bombing tragedy in 2013, for example, FBI agents used intelligence in the form of on-the-scene interviews and reviews of surveillance footage to swiftly release photos of the suspects to the public.

INTERPOL: Revolutionizing Law Enforcement With Smartcards

From facing war crimes and drug trafficking to computer crime and weapons smuggling, the International Police Organization (INTERPOL) has its collective hands full. It's an organization whose membership base spans 190 countries, and its officials are tasked with a lot of international travel. This isn't the kind of travel that's done at a leisurely pace, though. With culprits around the world to catch, INTERPOL agents need to travel expediently to nab criminals who use fraud and coercion to cross national borders and evade detection.

Why Government Agencies Need To Adopt eIDs

Increasingly, government applications and services are moving to cyberspace, which provides citizens with more convenient means of accessing these resources. However, the growing use of cyber apps and service-based solutions among governments is prompting a question of security. In a threat-heavy age, how can governments ensure that citizens are protected as they access privileged services? This is a question that's facing national governments around the world.

The Federated Identity: Making its Way to the Enterprise Level

Page 1 of 3