Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
288 Results for 'CT'
Blog

By Entrust Datacard

April 16, 2014

The cybersphere is not kind to companies that don't take measures to protect themselves -- and their customers -- from attack. A recently released infographic from Imprima does not paint a pretty picture of the state of enterprise security. Businesses have the power to prevent themselves from getting breached. One of the answers lies in identity-guarding options like two-factor authentication, which functions to ensures only authorizes users are accessing company networks, applications, servers and more. Entrust experts say there is no telling when a malicious force will try to breach a company. But when it happens, the smart play is to be prepared.
Blog

By Entrust Datacard

July 16, 2014

The issue airport breach points have begun to point to a greater need for enhanced data security. The need for critical infrastructure protection came into stark focus with the recent news that 75 airports fell victim to malicious intruders. This large-scale attack calls much-needed attention to the necessity of firming up cyber security in places like these. 
Blog

By Entrust Datacard

February 12, 2013

As major retailers and brands such as Starbucks grab international headlines for introducing innovative solutions for mobile wallets, much of the early innovation has actually been quietly happening within the public transportation space, from Chicago to Seoul and all points in between.
Blog

By Aaron Davis

July 10, 2017

If you’re looking for a stronger PKI solution, we’ve made some important product enhancements that simplify scaling up for digital business, deployment and management, and reduce your total cost of ownership.
Blog

By Entrust Datacard

September 30, 2014

A newly released report from Entrust Datacard on the preparedness of enterprises to deal with a data breach has found that awareness of data security is the highest it's ever been and more companies are instituting breach response plans to mitigate the effects of a cyberattack. Conducted by the Ponemon Institute and information services group Experian, the study found that 48 percent of organizations have increased their security technology investments in the last year and 73 percent instituted a data breach response plan during that same time.
Blog

By Ian Wills

June 16, 2017

A significant event will take place next year when a new data protection regime comes into force in Europe, replacing its 20-year-old predecessor. The new regime is called the General Data Protection Regulation (GDPR). 
Blog

By Entrust Datacard

April 10, 2013

Recognizing the convenience and service it offers cardholders, more financial institutions are taking advantage of instant issuance. As more adopt the technology and the market matures, customer expectations rise and new opportunities emerge.
Blog

By Entrust Datacard

November 03, 2014

According to Entrust Datacard, the growing cybersecurity threat to infrastructure has been on the government's radar for some time now. During a cybersecurity summit last year, former assistant defense secretary for Homeland Defense and America's Security Affairs Dr. Paul Stockton warned that a successful attack against a computer network connected to the power grid could cause the critical lifeline infrastructure to fail if the attack persisted long enough, disrupting hospitals, transportation and distribution of goods.
Blog

By Bruce Morton

July 17, 2013

The topic of perfect forward secrecy has come up due to the alleged actions of NSA and PRISM. It has been reported the NSA has been able to trap website communications and then are able to search and review those communications at a future time.
Blog

By Entrust Datacard

August 05, 2013

Apart from one another, information technology (IT) and operational technology (OT) are two separate entities that perform different functions. But together, they make up the backbone of a nation’s security and economic stability—both in the private and public sectors.
Page 1 of 29