Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
26 Results for 'NSA'
Blog

By Entrust Datacard

September 17, 2013

The Washington Post and other media outlets have provided extensive coverage of allegations made by Edward Snowden concerning some of the NSA's surveillance programs.
Blog

By Entrust Datacard

July 14, 2015

As a key facet of critical infrastructure, power plants — and the leaders who work at them — deal with highly privileged information on a regular basis. While enterprise security is a vital feature at all enterprises, at power plants it's especially imperative, since the consequences to not having it can be dire. 
Blog

By Entrust Datacard

May 27, 2015

There are some things that all offices need, regardless of the kind of business they're involved in. For instance, every company needs to keep track of its accounting. And all organizations require some way of overseeing employee compensation. These are not sector-specific tools -- they are universal enterprise requirements. And considering the cyber atmosphere we are living in, you can add another thing to that list: strong cybersecurity.
Blog

By Entrust Datacard

November 20, 2015

Day three of CARTES was full of great meetings and on-stand demonstrations. Entrust Datacard experts from across the globe joined the company in Paris this week to talk about the wide breadth of solutions for  trusted identity and secure transactions. 
Blog

By Entrust Datacard

November 19, 2015

Day two of CARTES is over and we have enjoyed meeting with current and potential customers and partners and talking about our solutions for trusted identities and secure transactions, as well as what the future holds for Entrust Datacard and the industry in general. During his speaking session on Wednesday, Tim Klabunde presented a very timely presentation surrounding border security and the importance of trusted identities. 
Blog

By Diana Gruhn

November 23, 2015

Ensuring Transaction Security Don’t let a cyber scam spoil your holiday cheer. Cyber criminals work daily to craft new ways to steal your personal data for financial gain. They are clever and tenacious and these year round Scrooges want nothing more for the holidays than to shout, “Bah humbug!” as they lure you in and rob you. Here are a few simple steps to protect your personal information and leave the “Bah humbug-ing” to holiday storytelling. In this first of a two part series, we discuss ways for you to ensure safer transactions during your online shopping experience.
Blog

By Entrust Datacard

October 19, 2015

October 1 was a game-changing day as far as credit cards are concerned. That's because this was the day that the EMV rollout went into effect in the United States. Although "rollout" was the term used to broadly describe what took place, October 1 did not actually signal a mandatory implementation of EMV across the board. Instead, it represented a fraud liability shift, wherein merchants - and not card providers - will be largely responsible for dealing with fraudulent transactions if these merchants are not EMV-enabled. This shifting of responsibility is meant to spur retailers to quickly adopt EMV processing capabilities. 
Blog

By Diana Gruhn

December 16, 2015

Cybercrime is especially high during the busy holiday season. This increased activity offers many more opportunities for fraudsters to catch online shoppers off guard. Don’t let them. Read this series to learn about website transaction security, and have a happy and secure holiday season.
Blog

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Blog

By Bruce Morton

March 18, 2015

Almost 20 years ago, the first publicly trusted certification authorities (CAs) began generating their root keys and root certificates, which represented the public trust of the first Internet root CAs. Slowly, these root certificates were provided to operating system and browser vendors to be embedded in their software. Embedding indicated that the software vendor trusted the CA to issue publicly trusted certificates. The CAs were relatively conservative. They developed certificate polices and certification practice statements. 
Page 1 of 3