Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
25 Results for 'blog'
Blog

By Entrust Datacard

November 30, 2015

Entrust® IdentityGuard 11.0 is unlocking the power of mobile business transformation with trusted identities. This blog series will explore how trusted identities are transforming the customer experience and revolutionizing the way financial, enterprise and government ecosystems secure their business. Do financial institutions really know their customers? 
Blog

By Bruce Morton

April 09, 2015

The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February 2015 marked the next major version of the network protocol used by the web. This blog covers how HTTP/2 will affect Internet security.
Blog

By Bruce Morton

April 22, 2015

There are many risks with the implementation of security using SSL. This blog outlines SSL best practices to consider. Entrust Datacard can provide guidance and solutions to use SSL best practices and deploy SSL with confidence.
Blog

By Entrust Datacard

April 07, 2015

These days, a password is a pretty weak barrier between a hacker and your private data. The inherent vulnerability of passwords is highlighted by two recent breaches: an attack on game video streaming service Twitch and a separate incident in which Uber users' passwords were stolen. This blog also discusses alternatives to password authentication. 
Blog

By Entrust Datacard

April 20, 2015

If you’re missing the conference this year, don’t worry. We’ve got you covered. Click here to check out our official page for all things RSAC 2015 and stay connected with our blog for daily schedules, presentation recaps and more. 
Blog

By Sharon Boeyen

April 01, 2015

The World of PKI Standards Public Key Infrastructure (PKI) facilitates security services across a global community of users and across various applications. As such, standards are a key requirement for the success of PKI. This blog covers: What’s in a Standard, X.509 – The Base Standard for PKI, Establishing Trust Among User Communities, The Internet PKI, and Passports & Smartcards.
Blog

By Entrust Datacard

August 24, 2015

For many, SSL certificates are synonymous with data encryption for the Internet. The technology — which secure Web sessions for users through the secure sockets layer protocol — is widely deployed by organizations that offer e-commerce and other services. After all, when it comes to e-commerce in particular, the arena is highly vulnerable. These days, there are many examples of such platforms that have been compromised, putting customers at risk. This blog covers some examples and recommendations.
Blog

By Bruce Morton

December 02, 2015

Research indicates that SHA-1 signed SSL/TLS certificates face increasing vulnerabilities forcing leading browsers to reconsider how long they will support this technology. This blog outlines dates around the phasing out of SHA-1.
Blog

By Entrust Datacard

January 22, 2013

Rumors of the “virtual wallet” and NFC-capable phones have been fodder for iPhone blogs and other media outlets for the past several years.
Blog

By Entrust Datacard

September 14, 2015

The future of payment is now. With the growing deployment of EMV smart card solutions, we're finally moving away from traditional — and highly vulnerable — cards and toward a solution that makes it very challenging for credit card fraud to be carried out. This is a vital step forward in the realm of payments, and one that couldn't come sooner, given the frequency of credit card-based attacks, and the growing sophistication of cybercriminals who attempt to carry out these intrusions. As a technology, EMV functions to bolster the security of the payment transaction through the presence of an in-card chip that helps with authentication and verification. In terms of what EMV does to provide an unprecedented degree of security during the transaction, there are three central elements, which Entrust Datacard VP of Financial Marketing Ray Wizbowski highlighted in a blog post:
Page 1 of 3