Filter Results expand_more
Government clear
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
31 Results
Blog

By Ann Erickson

September 06, 2018

This summer, Entrust Datacard hosted the first-ever Global Partner Conference in London to honor our FY18 Partners of the Year, who are trained and authorized to sell and support Entrust Datacard solutions across the world.
Blog

By Entrust Datacard

November 07, 2017

National and global security-related events on the rise. Now is the time for increased awareness and urgency around municipal security. 
Blog

By Entrust Datacard

May 11, 2016

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Blog

By Entrust Datacard

February 12, 2016

The White House announced a comprehensive plan on Feb. 9 to strengthen the nation’s cybersecurity, protect America’s privacy and safeguard intellectual property in the face of security threats — which are rapidly increasing in both frequency and sophistication.   
Blog

By Entrust Datacard

December 17, 2015

The Malaysian National ID cards – MyKad – allows citizens to access a variety of service with just one card.
Blog

By Entrust Datacard

November 30, 2015

Entrust® IdentityGuard 11.0 is unlocking the power of mobile business transformation with trusted identities. This blog series will explore how trusted identities are transforming the customer experience and revolutionizing the way financial, enterprise and government ecosystems secure their business. Do financial institutions really know their customers? 
Blog

By Entrust Datacard

October 14, 2015

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Blog

By Bruce Morton

September 08, 2015

In June 2015, the US chief information security officer (CIO) issued a memorandum to mandate HTTPS-only to secure Federal websites and web services. This policy is also known as Always-On SSL and HTTPS everywhere. The majority of Federal websites use HTTP; however the CIO states that HTTP is susceptible to interception, manipulation and impersonation. This vulnerability can be mitigated by implementing an HTTPS-only policy which must be implemented to all existing sites and services by December 31, 2016. 
Blog

By Entrust Datacard

July 27, 2015

Increasingly, government applications and services are moving to cyberspace, which provides citizens with more convenient means of accessing these resources. However, the growing use of cyber apps and service-based solutions among governments is prompting a question of security. In a threat-heavy age, how can governments ensure that citizens are protected as they access privileged services? This is a question that's facing national governments around the world.
Blog

By Entrust Datacard

June 29, 2015

From facing war crimes and drug trafficking to computer crime and weapons smuggling, the International Police Organization (INTERPOL) has its collective hands full. It's an organization whose membership base spans 190 countries, and its officials are tasked with a lot of international travel. This isn't the kind of travel that's done at a leisurely pace, though. With culprits around the world to catch, INTERPOL agents need to travel expediently to nab criminals who use fraud and coercion to cross national borders and evade detection.
Page 1 of 4