Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
26 Results for 'BAC'
Blog

By Bruce Morton

December 14, 2015

Looking Back at 2015 A number of new tactics proved 2015 was no exception to an active year defending against ever increasing security issues. Vendors found new and creative ways to provide vulnerabilities including the now popular man-in-the-middle (MitM) attacks. MitM as well as a host of other new vulnerabilities caused browsers to rethink their security requirements. This article gives a flashback of the exploits and industry changes from 2015 and looks ahead at the latest security requirements and how it impacts IT security teams
Blog

By Bruce Morton

January 12, 2015

This post was originally published on the CA Security Council blog. Looking Back at 2014, looking forward to 2015 and beyond.
Blog

By Ranjeet Khanna

September 25, 2017

The Internet of Things (IoT) demands the need to safeguard data between devices, sensors, and backend platforms connected within an IoT ecosystem.
Blog

By Bruce Morton

January 17, 2017

Vulnerabilities, Requirements for Code Signing Certificate, Certification Authority Authorization (CAA) Standards
Blog

By Entrust Datacard

February 05, 2012

On October 1, 2011, the provisions of the Durbin Amendment became law, which means that the Federal Reserve will be regulating the interchange fees for debit cards in the U.S. The new law will reduce, by nearly 50%, the average amount that retailers pay for debit card transactions.
Blog

By Bruce Morton

January 08, 2018

In 2018, look forward to measures that tighten security protocols for SSL/TLS certificates.  
Blog

By Tim Moses

December 23, 2013

NIST's withdrawn special publication 800-90A is back in the news.
Blog

By Entrust Datacard

August 05, 2013

Apart from one another, information technology (IT) and operational technology (OT) are two separate entities that perform different functions. But together, they make up the backbone of a nation’s security and economic stability—both in the private and public sectors.
Blog

By Jacquelyn Painter

April 15, 2019

At Entrust Datacard, we’ve made it our goal to demonstrate how choosing a smarter authentication approach can help you face this challenge head-on while giving you back some much-deserved “you time.”
Blog

By Bruce Morton

January 16, 2019

Here are some details on some of the 2018 happenings in the SSL/TLS ecosystem.
Page 1 of 3