Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
39 Results for 'Who'
Blog

By Mike Byrnes

January 19, 2015

The digital world is constantly evolving. More organizations are using mobile, cloud and social media solutions as vessels to connect and communicate with their employees, customers and citizens. Social media platforms such as Twitter, YouTube and LinkedIn provide real-time channels to communicate our news, views and also can be a critical tool for public safety used to inform the public. Last week, the announcement of an attack on US Central Command (CentCom) social media accounts made headlines.
Blog

By Entrust Datacard

January 12, 2015

The EMV 101 series provides go-to-resources for those who are interested in learning more about EMV payment technology and EMV migration in the U.S. This is the third entry to this series that explores who will be affected by the U.S. EMV migration, and how they can best prepare for the shift.
Blog

By Entrust Datacard

January 19, 2015

The EMV 101 series provides go-to-resources for those who are interested in learning more about EMV payment technology and EMV migration in the U.S. This is the fourth entry to this series that outlines the timeline for the U.S. EMV migration. As we progress through the series, we will go more in-depth on the EMV technologies and applications that are important for a successful program roll out.
Blog

By Entrust Datacard

July 20, 2015

As a key facet of critical infrastructure, power plants — and the leaders who work at them — deal with highly privileged information on a regular basis. While enterprise security is a vital feature at all enterprises, at power plants it's especially imperative, since the consequences to not having it can be dire.
Blog

By Entrust Datacard

July 14, 2015

As a key facet of critical infrastructure, power plants — and the leaders who work at them — deal with highly privileged information on a regular basis. While enterprise security is a vital feature at all enterprises, at power plants it's especially imperative, since the consequences to not having it can be dire. 
Blog

By Entrust Datacard

July 01, 2015

The EMV 101 series provides go-to-resources for those who are interested in learning more about EMV payment technology and EMV migration in the U.S. This is the fourth entry to this series that outlines the timeline for the U.S. EMV migration.  As we progress through the series, we will go more in-depth on the EMV technologies and applications that are important for a successful program roll out.
Blog

By Entrust Datacard

June 10, 2015

The North American Electric Reliability Corporation Critical Infrastructure Protection standards are the guiding set of principles by which U.S. power companies must abide. In its mission statement, NERC describes its function as assuring "the reliability of the bulk power system in North America." Its industry standards, therefore, are an effort to maintain this reliability - and hold those who threaten it accountable. 
Blog

By Entrust Datacard

June 29, 2015

From facing war crimes and drug trafficking to computer crime and weapons smuggling, the International Police Organization (INTERPOL) has its collective hands full. It's an organization whose membership base spans 190 countries, and its officials are tasked with a lot of international travel. This isn't the kind of travel that's done at a leisurely pace, though. With culprits around the world to catch, INTERPOL agents need to travel expediently to nab criminals who use fraud and coercion to cross national borders and evade detection.
Blog

By Entrust Datacard

May 18, 2015

In March, a chart came out comparing the stereotypical computer hacker of 1995 to that of 2015. According to the chart's characterization, the hacker of 20 years ago was in every sense an amateur: often a kid in a basement seeing how much he or she could get away with. By today's standards, the 1995 hackers come off as almost benign. Sure, they would play around with the data on your computer and cause you a hassle here and there, but at the end of the day they were not stealing your identity, making off with your credit cards or trying to take control of the car you're driving. Flash forward 20 years and you have an image of the hacker that is entirely different from its predecessor.
Blog

By Entrust Datacard

October 14, 2015

Entrust Datacard Click here to view our new corporate video. Today, what Entrust Datacard does matters – it matters to the everyday consumer who needs to secure payment information; it matters to the citizen traveling across borders and wants to ensure secure board entry; and it matters to the employee who may need to log into a network for work and ensure that company information or their ID’s are not stolen.  Today, virtually every consumer, citizen and enterprise employee around the world touches Entrust Datacard solutions in some way.
Page 1 of 4