Filter Results expand_more
PKI clear
Blog add
Authors add
Solutions add
Products add
Product Categories add
43 Results
Blog

By Entrust Datacard

September 30, 2014

A newly released report from Entrust Datacard on the preparedness of enterprises to deal with a data breach has found that awareness of data security is the highest it's ever been and more companies are instituting breach response plans to mitigate the effects of a cyberattack. Conducted by the Ponemon Institute and information services group Experian, the study found that 48 percent of organizations have increased their security technology investments in the last year and 73 percent instituted a data breach response plan during that same time.
Blog

By Entrust Datacard

October 15, 2014

Entrust Datacard reports that a recent survey conducted by IT professional network Spiceworks has found that ransomware is a growing concern with the cybersecurity community. While the current threat landscape is giving IT professionals lots to worry about, ransomware appears to be the biggest problem at the moment. The study found that 88 percent of respondents had concerns about ransomware, and one-third of participants had already suffered an attack, IT Pro Portal reported.
Blog

By Entrust Datacard

November 10, 2014

The recently released Global State of Information Security Survey 2015 found that the number of information security incidents reported around the world rose to 42.8 million in 2014, an increase of almost 50 percent. According to the study released by Pricewaterhouse Coopers, 117,000 cyberattacks occurred each day, and detected security incidents have grown by 66 percent year-over-year since 2009. 
Blog

By Entrust Datacard

December 04, 2014

Preventing the tide of Malware takes awareness. It is possible to rid your systems of malware when it's already present. But as organizations with endpoint protection can tell you, business is simply better. It takes a significant burden off IT departments and allows company employees to guide their attention toward the betterment of the business instead of always having to be examining the computer system. In this way, it's a great investment.
Blog

By Entrust Datacard

April 13, 2016

Entrust shows how stronger encryption, better account authentication and SSL encryption can help online retailers step up their cybersecurity game with a few key ways to better protect customers' data.
Blog

By Josh Jabs

September 15, 2016

How the technologies change the approach to trust, how risk is defined within an organization, and ultimately the business value that is trying to be unlocked are all parts of the challenge we continue to explore. The move to digital business, like any other change, presents us with some good, and some bad, circumstances.
Blog

By Josh Jabs

September 22, 2016

In August, Gartner issued a report titled PKI Is Gearing Up for the Internet of Things. While IOT is an important aspect of what’s addressed in the report and a foundational aspect of digital business (and something we’re really excited about), the focus on IoT in the title somewhat undervalues the breadth of content covered in the report. 
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Sandra Carielli

November 17, 2016

Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In Part 1, we reviewed the concept of policy authorities and did a deep dive on public trust, talking about the benefits and drawbacks of that model. In Part 2, we conduct a similar deep dive on private trust and discuss public/private hybrid approaches that might benefit your organization.
Blog

By Sandra Carielli

November 10, 2016

Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In a public-key-based authentication system, the policy authority plays a critical role: it dictates the rules by which the system operates, and therefore, the level of assurance it achieves.
Page 1 of 5