Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
16 Results for 'passwords'
Blog

By Ryan Zlockie

September 20, 2017

Single authentication provided by passwords is no longer sufficient for keeping data and identities safe.
Blog

By Chris Taylor

December 02, 2013

On Saturday, Forbes discussed Google’s 2014 vision to make user-generated passwords obsolete. It’s an initiative that deserves praise and is long overdue. Someone is finally taking strong authentication and identity-based security seriously — particularly in the consumer space. It does, however, come with some caveats.
Blog

By Entrust Datacard

November 30, 2013

On Saturday, Forbes discussed Google’s 2014 vision to make user-generated passwords obsolete. It’s an initiative that deserves praise and is long overdue. Someone is finally taking strong authentication and identity-based security seriously — particularly in the consumer space.
Blog

By Entrust Datacard

September 03, 2013

Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on.
Blog

By Jacquelyn Painter

December 08, 2017

Authentication needs are changing. Passwords don’t cut it anymore. The digital transformation of business requires a new set of practices for modern identity. 
Blog

By Entrust Datacard

August 06, 2013

Whether it’s through the constant use of passwords, answering security questions online or verifying an address over the phone, most people understand the importance of authenticating identities. But this theory also is critical to verify the identities of mobile devices connecting and interacting with a secure network.
Blog

By Entrust Datacard

September 04, 2013

As organizations and individuals continue to look for ways to ensure the security of digital information and move away from a world of passwords, one option that has been tossed around for several years includes the collection and analysis of specific human body characteristics. Eye retina scans, fingerprints and voice samples are all examples of a type of security system commonly referred to as biometrics.
Blog

By Jason Soroko

June 16, 2016

A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. From passwords, to certificates and analytics, there have been a number of techniques that have evolved over the years to establish and manage identity. 
Blog

By Entrust Datacard

September 09, 2014

Entrust Datacard covers the fallout of another major data breach, this time affecting sensitive photos stored on celebrities' iCloud accounts. In the wake of the incident, Apple has released a statement calling the breach "a very targeted attack on user names, passwords and security questions," adding that "none of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find My iPhone."
Blog

By Entrust Datacard

April 10, 2014

This Entrust blog focuses on the Heartbleed Bug,  a serious vulnerability in the popular OpenSSL cryptographic software library and how it can launch an attach from a client on a server or from a server to a client.   
Page 1 of 2