Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
12 Results for 'compliance'
Blog

By Bruce Morton

August 19, 2015

Entrust is providing the SSL Server Compliance Timeline. This timeline will inform you of modifications to the SSL/TLS industry. The SSL Server Compliance Timeline will track industry compliance issues from the CA/Browser Forum and the browser manufacturers. The timeline will track attacks and vulnerabilities. For each item, the timeline will also advise who will take the action and when it has to be addressed. 
Blog

By Entrust Datacard

June 10, 2015

The North American Electric Reliability Corporation Critical Infrastructure Protection standards are the guiding set of principles by which U.S. power companies must abide. In its mission statement, NERC describes its function as assuring "the reliability of the bulk power system in North America." Its industry standards, therefore, are an effort to maintain this reliability - and hold those who threaten it accountable. 
Blog

By Entrust Datacard

June 22, 2015

Intelligence is perhaps the single greatest tool in the fight against crime. Look at any major criminal incident brought to justice and you can be almost certain outside intelligence played a pivotal role. In the wake of the Boston marathon bombing tragedy in 2013, for example, FBI agents used intelligence in the form of on-the-scene interviews and reviews of surveillance footage to swiftly release photos of the suspects to the public.
Blog

By Diana Gruhn

June 26, 2018

Apple will join leading browser Google Chrome in enforcing a Certificate Transparency policy for all public SSL/TLS certificates issued after October 15, 2018. Websites that have certificates that are out of compliance risk their users encountering trust errors.
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Bruce Morton

August 01, 2013

Certification authorities (CA) have always been compliance-minded and have historically imposed third-party audits upon themselves.
Blog

By Bruce Morton

May 20, 2013

There is an industry myth that certification authorities (CAs) are not regulated. In fact publicly-trusted SSL CAs support the development of industry regulations and have been audited annually to ensure compliance to the many requirements.
Blog

By Bruce Morton

March 13, 2015

With the news of Superfish, Komodia and PrivDog , there has been some interesting discussion on private trust and HTTPS proxies. Private Trust By private trust, I mean the use of private certification authorities (CAs). On the Internet, we use public trust CAs. These CAs are created in accordance with browser certificate policies, are highly secured and are audited on an annual basis to confirm they meet their compliance requirements. Private trust CAs have no security requirements to meet but their own. 
Blog

By Entrust Datacard

February 28, 2013

While this topic may not directly impact everyone, the policy and technology being implemented in law enforcement could provide blueprints for other industries or verticals to leverage advanced authentication solutions for properly verifying all manners of digital and device identities.
Blog

By Entrust Datacard

February 26, 2013

Entrust’s gearing up for a big, big week. Our go-to guys will focus on four key security areas: cloud, mobility, malware and CJIS compliance.
Page 1 of 2