Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
147 Results for 'RAT'
Blog

By Entrust Datacard

January 19, 2015

The EMV 101 series provides go-to-resources for those who are interested in learning more about EMV payment technology and EMV migration in the U.S. This is the fourth entry to this series that outlines the timeline for the U.S. EMV migration. As we progress through the series, we will go more in-depth on the EMV technologies and applications that are important for a successful program roll out.
Blog

By Entrust Datacard

July 01, 2015

The EMV 101 series provides go-to-resources for those who are interested in learning more about EMV payment technology and EMV migration in the U.S. This is the fourth entry to this series that outlines the timeline for the U.S. EMV migration.  As we progress through the series, we will go more in-depth on the EMV technologies and applications that are important for a successful program roll out.
Blog

By Entrust Datacard

April 27, 2015

The same cyberattack can mean different levels of severity for different businesses. It boils down to each company's level of security. To illustrate how significantly enterprise preparation can determine the outcome of a cyberattack, we've devised a hypothetical cybercriminal scenario alongside with three different companies, each of which have different levels of cyber preparedness. Let's see how these three different businesses fare when hit with the same attack.
Blog

By Entrust Datacard

April 29, 2015

In the first part of this piece, we introduced the idea that it's not so much the strength of the cyberattack that determines its impact — it's the preparedness of the business that's targeted. For this reason, a single attack can have vastly different effects depending on different levels of enterprise security. In the last article, we presented three businesses with different approaches to network security. Let's see how each of the three businesses respond when hit by this intrusion. The lesson here: There's no such thing as being halfway prepared for a cyberattack. As a business, you either have the tools to combat cybercrime or you don't — there's no middle ground.
Blog

By Mike Moir

December 19, 2018

This gift that just keeps giving will be available direct from Citrix and Entrust Datacard or through your favorite local systems integrator beginning in January.
Blog

By Entrust Datacard

September 08, 2016

Education opportunities are allowing financial institutions to empower the cardholder, provide cross-sell opportunities and move lower-value in-branch transactions to other channels. All of which provide the bank or credit union with higher customer service scores and additional revenue generating opportunities. To learn more about our instant issuance solutions, read more from Entrust Datacard. 
Blog

By Entrust Datacard

April 03, 2013

As the financial industry experiences major change — including the adjustments the recent announcements to accelerate EMV chip migration in the U.S. by 2015 – banks are being forced to re-evaluate their business strategies to minimize costs and increase efficiencies and innovations in their card operations.
Blog

By Bruce Morton

October 26, 2016

The Long-Life Certificate: Why It Doesn’t Exist Why is certificate expiration even necessary? Wouldn’t it be better if I could just buy a certificate with a long life before expiration? It would really simplify certificate management if it could be installed and forgotten.
Blog

By Sandra Carielli

November 10, 2016

Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In a public-key-based authentication system, the policy authority plays a critical role: it dictates the rules by which the system operates, and therefore, the level of assurance it achieves.
Blog

By Sandra Carielli

November 17, 2016

Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In Part 1, we reviewed the concept of policy authorities and did a deep dive on public trust, talking about the benefits and drawbacks of that model. In Part 2, we conduct a similar deep dive on private trust and discuss public/private hybrid approaches that might benefit your organization.
Page 1 of 15