Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
26 Results for 'BAC'
Blog

2016 – Looking Back, Moving Forward

By Bruce Morton
December 14, 2015
Looking Back at 2015 A number of new tactics proved 2015 was no exception to an active year defending against ever increasing security issues. Vendors found new and creative ways to provide vulnerabilities including the now popular man-in-the-middle (MitM) attacks. MitM as well as a host of other new vulnerabilities caused browsers to rethink their security requirements. This article gives a flashback of the exploits and industry changes from 2015 and looks ahead at the latest security requirements and how it impacts IT security teams
Blog

2015 – Looking Back, Moving Forward

By Bruce Morton
January 12, 2015
This post was originally published on the CA Security Council blog. Looking Back at 2014, looking forward to 2015 and beyond.
Blog

The Durbin Amendment – Don't Let Customer Service Take A Back Seat

By Entrust Datacard
February 05, 2012
On October 1, 2011, the provisions of the Durbin Amendment became law, which means that the Federal Reserve will be regulating the interchange fees for debit cards in the U.S. The new law will reduce, by nearly 50%, the average amount that retailers pay for debit card transactions.
Blog

Bracing the Internet's backbone with stronger authentication

By Entrust Datacard
March 29, 2016
Whether you're running a massive, top-secret facility that houses NSA intelligence, you're a health care provider that relies on its data center for access to patients' medical records or you're a world-leading cloud provider, slacking on authentication is just about the dumbest thing you can do. Keep your organization's data – or your customers' data in the case of a cloud vendor – safe with smart, strong authentication.  
Blog

Schools Can Step up Their Security Game With More Secure ID Cards

By Entrust Datacard
July 14, 2016
As hubs of research, academia and culture, colleges have been targets of hackers on more than one occasion in the past few years. In 2014, one university reported a data breach that exposed the personally identifiable information of hundreds of thousands of students and staff, dating back to 1998.
Blog

Banks Go Head-to-Head with Cyber Bandits

By Entrust Datacard
May 18, 2016
In the past few years, financial institutions have started dealing with a new breed of robber, the cybercriminal. One prominent hack in February resulted in at least $80 million in losses, and brought the issue back into the limelight – and it may linger there for quite some time.
Blog

Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 2

By Sandra Carielli
November 17, 2016
Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In Part 1, we reviewed the concept of policy authorities and did a deep dive on public trust, talking about the benefits and drawbacks of that model. In Part 2, we conduct a similar deep dive on private trust and discuss public/private hybrid approaches that might benefit your organization.
Blog

Dual-EC DRBG Concerns Hit Media Again

By Tim Moses
December 23, 2013
NIST's withdrawn special publication 800-90A is back in the news.
Blog

Deploying a Critical Infrastructure Protection Solution with OT and IT

By Entrust Datacard
August 05, 2013
Apart from one another, information technology (IT) and operational technology (OT) are two separate entities that perform different functions. But together, they make up the backbone of a nation’s security and economic stability—both in the private and public sectors.
Blog

Shellshock — What is the Bash Bug Vulnerability?

By Jason Soroko
September 26, 2014
Security experts discovered a bug in Bash — which has been named “Shellshock” — that could be used to compromise systems that utilize the Bash shell. The bug dates back to Version 1.13. Bourne-Again Shell, or Bash, is software that is built into nearly 70 percent of machines connected to the Internet. Bash has been widely used for the GNU operating system, as well as a default shell on Linux since 1989. It is also extensively used as the GNU shell for Mac OS X. Learn more. 
Page 1 of 3