Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
306 Results for 'CT'
Blog

By Entrust Datacard

July 14, 2015

As a key facet of critical infrastructure, power plants — and the leaders who work at them — deal with highly privileged information on a regular basis. While enterprise security is a vital feature at all enterprises, at power plants it's especially imperative, since the consequences to not having it can be dire. 
Blog

By Entrust Datacard

November 09, 2015

It's no surprise that banks are a highly lucrative target for cybercriminals. After all, if you're a hacker scoping out your next victim, wouldn't you want to choose something that gives you the most direct access to money? As of November 3, there have been more than five million records breached so far this year within banking/credit/financial organizations, according to data compiled by the Identity Theft Resource Center. While one might think that only big banks are the targets, this is hardly the case. Sure, hacks like the JP Morgan incident — which led to U.S. authorities getting involved and arresting five suspects — are bound to get the most traction in the news. But in fact, hackers are looking to attack banks and credit unions operating at any scale. Here are just a few of the banking-based breach episodes that have already occurred in 2015:
Blog

By Entrust Datacard

November 05, 2015

As consumer's expectations for on-demand service continues to rise, banks continue to meet consumer needs by integrating instant issuance of debit cards into their branch locations. By doing so, branches are helping to drive incremental revenue for banks, increase top of wallet card placement and card activation, all while working to meet the increased demands of their customers. A recent study by Javelin Strategy, sponsored by Entrust Datacard, shows that cardholders are 22 percent more likely to be very-to-extremely satisfied with their bank if they have received and instantly issued debit card instead of a card sent by mail.
Blog

By Bruce Morton

April 22, 2015

There are many risks with the implementation of security using SSL. This blog outlines SSL best practices to consider. Entrust Datacard can provide guidance and solutions to use SSL best practices and deploy SSL with confidence.
Blog

By Entrust Datacard

August 31, 2015

With the new school year beginning, it's important for all school districts out there to evaluate their security policies and determine if they are doing everything possible to ensure that students and staff are well protected. Spring Lake Park School District offers a valuable example of how all districts can implement and upgrade their security solutions to meet the evolving needs of the day.
Blog

By Entrust Datacard

December 28, 2015

The progression of cybersecurity mostly occurs in step with the continued evolution of technology in order to ensure that every innovation is as secure as it is functional. As time passes, the level of complexity of information and communication technology continues to introduce new vulnerabilities, presenting cybersecurity professionals with unique challenges. Let's take a look at some of the top cybersecurity trends that lie in wait in 2016.
Blog

By Entrust Datacard

February 19, 2015

In this evolving digital environment, organizations in every industry are working to develop solutions that maximize convenience and productivity while minimizing risk. These new demands are changing the way we think about security and creating the need for end-to-end secure solutions. Just as the connectivity of our world is transforming the way we live and work, this new understanding of security is impacting the very core of how organizations operate. No matter your organization’s unique challenges, here are several key focal points for developing effective solutions.
Blog

By Bruce Morton

March 18, 2015

Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which represented the public trust of the first Internet root CAs. Slowly, these root certificates were provided to operating system and browser vendors to be embedded in their software. Embedding indicated that the software vendor trusted the CA to issue publicly trusted certificates. The CAs were relatively conservative. They developed certificate polices and certification practice statements. 
Blog

By Entrust Datacard

September 29, 2015

In a business environment, the odds of someone encountering malware are extremely high. As one report revealed, 45 percent of Internet users came up against malware during last year alone. And these days, confronting a malicious strain can often be accompanied by significant repercussions. Among the most common consequences that occur as a result of a malicious infection are changes in operating system settings, unauthorized social media posting, data loss and information theft. For one out of three users who is infected with malware, that intrusion will lead to monetary losses. Considering that almost half of Web users faced malware, it should come as little surprise that enterprises - which have networks accessed by many different people - are particularly vulnerable to intrusions.
Blog

By Bruce Morton

December 19, 2013

A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Page 1 of 31