Filter Results expand_more
Government clear
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
32 Results
Blog

Understanding the Timing of the Quantum Threat

By Samantha Mabey
October 28, 2019
Learn how to prepare for the inevitable cybersecurity threat of quantum computing, as outlined by the Global Risk Institute’s “Quantum Threat Timeline Report.”
Blog

Entrust Datacard Global Partner Conference 2018: The Winners Are…

By Ann Erickson
September 06, 2018
This summer, Entrust Datacard hosted the first-ever Global Partner Conference in London to honor our FY18 Partners of the Year, who are trained and authorized to sell and support Entrust Datacard solutions across the world.
Blog

Webinar: Affordable Solutions to Secure Local Government IDs

By Entrust Datacard
November 07, 2017
National and global security-related events on the rise. Now is the time for increased awareness and urgency around municipal security. 
Blog

How to Enhance Mobile Security in Health Care Organizations

By Entrust Datacard
May 11, 2016
In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Blog

Obama’s Bold Action to Protect Americans in Today’s Digital World

By Entrust Datacard
February 12, 2016
The White House announced a comprehensive plan on Feb. 9 to strengthen the nation’s cybersecurity, protect America’s privacy and safeguard intellectual property in the face of security threats — which are rapidly increasing in both frequency and sophistication.   
Blog

The World's First Smart National Identity Card

By Entrust Datacard
December 17, 2015
The Malaysian National ID cards – MyKad – allows citizens to access a variety of service with just one card.
Blog

Creating a Friction Free Banking Experience

By Entrust Datacard
November 30, 2015
Entrust® IdentityGuard 11.0 is unlocking the power of mobile business transformation with trusted identities. This blog series will explore how trusted identities are transforming the customer experience and revolutionizing the way financial, enterprise and government ecosystems secure their business. Do financial institutions really know their customers? 
Blog

5 Steps Governments Can Take to Secure Their Borders

By Entrust Datacard
October 14, 2015
In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Blog

Always-On SSL, The President Wants It Too

By Bruce Morton
September 08, 2015
In June 2015, the US chief information security officer (CIO) issued a memorandum to mandate HTTPS-only to secure Federal websites and web services. This policy is also known as Always-On SSL and HTTPS everywhere. The majority of Federal websites use HTTP; however the CIO states that HTTP is susceptible to interception, manipulation and impersonation. This vulnerability can be mitigated by implementing an HTTPS-only policy which must be implemented to all existing sites and services by December 31, 2016. 
Blog

Why Government Agencies Need To Adopt eIDs

By Entrust Datacard
July 27, 2015
Increasingly, government applications and services are moving to cyberspace, which provides citizens with more convenient means of accessing these resources. However, the growing use of cyber apps and service-based solutions among governments is prompting a question of security. In a threat-heavy age, how can governments ensure that citizens are protected as they access privileged services? This is a question that's facing national governments around the world.
Page 1 of 4