Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
26 Results for 'BAC'
Blog

By Bruce Morton

December 14, 2015

Looking Back at 2015 A number of new tactics proved 2015 was no exception to an active year defending against ever increasing security issues. Vendors found new and creative ways to provide vulnerabilities including the now popular man-in-the-middle (MitM) attacks. MitM as well as a host of other new vulnerabilities caused browsers to rethink their security requirements. This article gives a flashback of the exploits and industry changes from 2015 and looks ahead at the latest security requirements and how it impacts IT security teams
Blog

By Bruce Morton

January 12, 2015

This post was originally published on the CA Security Council blog. Looking Back at 2014, looking forward to 2015 and beyond.
Blog

By Tim Moses

January 29, 2015

As part of our ongoing celebration of the 20th Anniversary of Entrust’s Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.
Blog

By Entrust Datacard

January 27, 2015

It doesn't matter how big or small your business is, or whether its annual revenue places it on the Fortune 500 list. If you run an enterprise, you are a potential target of cybercrime. It's as simple as that. The problem is that some enterprises don't seem to realize this. Instead of preparing to guard against the multitude of threats out there, they prefer to operate in a mode of futile rationalizing. We're not a big enough business anyway. We don't represent the kind of target that would be lucrative for hackers. These are the types of excuses that organizations fall back on to justify inaction. But this approach is a recipe for disaster. Instead, companies need to stop making excuses and start focusing on coming up with the best cybersecurity plan for them.
Blog

By Entrust Datacard

June 15, 2015

Back in 1994, Entrust debuted the world's first commercially available public key infrastructure. In the more than 20 years since then, it's been refining and building on the technology. Over the past two decades, enterprise security needs have skyrocketed alongside the growth of connected technology. According to one report from last year, 94 percent of the organizations surveyed reported experiencing cybersecurity issues. These days, a single targeted attack can end up costing an enterprise millions of dollars - and it's not only big corporations and financial institutions that are targeted: From medicine and government entities to small and medium-sized companies, everyone is a target. Across the board, susceptibility to cybercrime has never been higher.
Blog

By Entrust Datacard

November 13, 2015

When it comes to ePassports, that's not a topic that is new to governments. In fact, it has been a subject of discussion - and action - for some time now. Back in 2012, the International Civil Aviation Organization (ICAO) put out a report stating that roughly half of U.N. member states were issuing ePassports. At the time, the U.S. was leading the pack in terms of ePassport offerings, but European countries and nations in the Asia-Pacific region were also gaining momentum as far as their own ePassport presence, according to SecureID News. 
Blog

By Bruce Morton

April 15, 2015

As of April 1st, 2015, the lifetime of SSL certificates has now been reduced to 39 months, in accordance with the CA/Browser Forum Baseline Requirements. Moving forward, consider using shorter life certificates. Even though the maximum validity period is now 39 months, you can drop this validity period to one or two years. Consider the validity period as the backstop to protecting your private key, your website, and your user’s data. But remember one important item, when you renew your certificate, please create a new private key. 
Blog

By Bruce Morton

April 09, 2015

The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February 2015 marked the next major version of the network protocol used by the web. This blog covers how HTTP/2 will affect Internet security.
Blog

By Tim Moses

February 12, 2015

As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In parts one and two, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology. Today we look back at how patent issues and government involvement affected the continued development, access and adoption of PKI.
Blog

By Tim Moses

March 05, 2015

As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology thus far. Today we look at the future of PKI and the complexities of creating secure policies and practices that extend beyond borders to protect citizens and data worldwide.
Page 1 of 3