Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
12 Results for 'compliance'
Blog

By Bruce Morton

August 19, 2015

Entrust is providing the SSL Server Compliance Timeline. This timeline will inform you of modifications to the SSL/TLS industry. The SSL Server Compliance Timeline will track industry compliance issues from the CA/Browser Forum and the browser manufacturers. The timeline will track attacks and vulnerabilities. For each item, the timeline will also advise who will take the action and when it has to be addressed. 
Blog

By Diana Gruhn

June 26, 2018

Apple will join leading browser Google Chrome in enforcing a Certificate Transparency policy for all public SSL/TLS certificates issued after October 15, 2018. Websites that have certificates that are out of compliance risk their users encountering trust errors.
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Bruce Morton

December 05, 2016

 If you have yet to migrate to SHA-2, check out Entrust Datacard’s SHA-2 Migration Guide. It will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Blog

By Tim Moses

August 16, 2017

The renewed focus on privacy prompted by the GDPR provides an opportunity for businesses to rethink how they interact with their users (whether employees, contractors, partners, or customers), pushing the needs of the user to the forefront.
Blog

By Entrust Datacard

February 28, 2013

While this topic may not directly impact everyone, the policy and technology being implemented in law enforcement could provide blueprints for other industries or verticals to leverage advanced authentication solutions for properly verifying all manners of digital and device identities.
Blog

By Entrust Datacard

February 26, 2013

Entrust’s gearing up for a big, big week. Our go-to guys will focus on four key security areas: cloud, mobility, malware and CJIS compliance.
Blog

By Bruce Morton

August 01, 2013

Certification authorities (CA) have always been compliance-minded and have historically imposed third-party audits upon themselves.
Blog

By Bruce Morton

May 20, 2013

There is an industry myth that certification authorities (CAs) are not regulated. In fact publicly-trusted SSL CAs support the development of industry regulations and have been audited annually to ensure compliance to the many requirements.
Blog

By Entrust Datacard

June 10, 2015

The North American Electric Reliability Corporation Critical Infrastructure Protection standards are the guiding set of principles by which U.S. power companies must abide. In its mission statement, NERC describes its function as assuring "the reliability of the bulk power system in North America." Its industry standards, therefore, are an effort to maintain this reliability - and hold those who threaten it accountable. 
Page 1 of 2