Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
10 Results for 'control'
Blog

By Jason Soroko

February 21, 2017

OT/IT Convergence and the Need for Secure Device Ecosystems OT has been around a long time and has specific needs and constraints. ICS systems are indeed under attack and there is a need for comprehensive security. Security based on managed identities should be an important part of a defense-in-depth strategy in ICS. Uniquely identifying, authenticating, authorizing those devices and securing the data are ideas that are shared by federal guidance and international regulation. When choosing a partner to help secure your industrial control systems, seek a long term partner who understands the unique needs of OT environments. You can find out more about how we are helping to secure the industrial IoT ecosystem by viewing our infographic.
Blog

By Entrust Datacard

May 18, 2015

In March, a chart came out comparing the stereotypical computer hacker of 1995 to that of 2015. According to the chart's characterization, the hacker of 20 years ago was in every sense an amateur: often a kid in a basement seeing how much he or she could get away with. By today's standards, the 1995 hackers come off as almost benign. Sure, they would play around with the data on your computer and cause you a hassle here and there, but at the end of the day they were not stealing your identity, making off with your credit cards or trying to take control of the car you're driving. Flash forward 20 years and you have an image of the hacker that is entirely different from its predecessor.
Blog

By Entrust Datacard

May 11, 2015

The U.S. Center for Disease Control and Prevention has its headquarters in Atlanta. Every time there is a major disease outbreak — or even concerns about one — the CDC makes headlines. It was at the center of the United States' response to the Ebola scare last year. More recently, it reported on the first apparent instance of the transmission of plague via dog to human. When there is a disease story making the rounds, the CDC is on the scene. In a recent article for Forbes, Dave Lewis pointed out that the treatment of infectious diseases was an evolving but somewhat scattershot affair before the emergence of a centralized hub. 
Blog

By Bruce Morton

August 05, 2015

I had the opportunity to review a verification issue last week, and it had me thinking of the value of EV certificates. First for every SSL/TLS certificate request, our verification teams goes through a validation process to authenticate the identity, ownership or control of the domain name, and authorization to issue the certificate. This process is increased substantially for Extended Validation (EV) certificates.
Blog

By Entrust Datacard

August 06, 2013

A balanced relationship must exist between governments that require personal information from citizens entering their country and citizens who are willing to give up this information.
Blog

By Bruce Morton

March 20, 2015

Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Microsoft. Was this Comodo’s fault? Let’s discuss. Since 2012, the certification authorities (CAs) which issue public trust SSL certificates must follow the domain verification methods in the CA/Browser Forum Baseline Requirements (BRs). The BRs provide methods for organization validation (OV) and domain validation (DV).
Blog

By Entrust Datacard

November 04, 2013

Throughout North America there runs an interconnected network of electricity comprised of transmission and control centers referred to as the bulk electric system. The bulk electric system is directly responsible for providing generation resources to local electrical systems located throughout the continent.
Blog

By Bruce Morton

November 27, 2017

A Brand TLD allows companies such as Ford to have domains ending with .ford, Netflix to have .netflix and Google to have .youtube. A Brand TLD allows the company to communicate its brand through the URL. It also enables the company to control policy and security for the whole TLD.  
Blog

By Bruce Morton

July 28, 2014

Entrust is now moving into the deployment of the Internet of Things (IoT) in an attempt to attach uniquely identifiable devices to the existing Internet infrastructure. The connected devices will allow you to receive better information, control items and, simply, just do fun stuff.
Blog

By Bruce Morton

February 21, 2013

Over the years, publicly-trusted CAs have issued SSL certificates with domain names of different types. The most common is the Fully Qualified Domain Name (FQDN). This is a certificate that has been issued with a name registered with an entity that manages a top-level domain (TLD), for example server1.domain.com. The differentiating characteristic about an FQDN is that it is unique. There is one controller of domain.com and that controller determines who can have any name under that root, such as server1.domain.com
Page 1 of 1