Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
25 Results for 'risk'
Blog

By Sandra Carielli

December 11, 2017

How do you explain to your business the risk of continuing to use SHA-1 certificates?
Blog

By Entrust Datacard

July 14, 2015

As the transmission of information increases and businesses pursue more mobile-centered options, these developments create risks in addition to possibilities. But the vulnerabilities of an increasingly digital world can be mitigated via the implementation of centralized digital certificate management. As SSLShopper has pointed out, SSL certificates play a huge role in keeping data secure as it is in transit. The principle behind an SSL certificate is it that secures information so that the data being sent is only accessible to the specific recipient. This protects against the risks that could befall insecure data, such as information tampering and spying. In a typical enterprise workflow, privileged data is transmitted frequently. Without SSL, that information immediate becomes vulnerable. Here are three top reasons why SSL certificates are still vital for businesses:
Blog

By Entrust Datacard

July 22, 2015

Cloud computing is a platform that's being leveraged by every kind of business, but certain industries are slower to warm to it than others. Banking, which is characterized by a need for top-tier enterprise security, is one sector where high security needs create a strong sense of trepidation when it comes to migrating to virtualized business platforms. The debate around enterprise cloud computing is hardly unique to banking. From real estate and education to insurance providers and oil/gas companies, there are conversations in IT boardrooms about the relative risks and rewards of migrating to a virtualized infrastructure, where the prospect of lower costs and increased efficiency clash with the perceived heightened vulnerability of cloud platforms
Blog

By Entrust Datacard

May 20, 2015

If you have ever read even a little bit of cybersecurity news, you're bound to hear terms like "virus," "malware," "spyware," and "DDoS attack" thrown around with some frequency. The terms can quickly blur together, and it can become difficult to differentiate between them. Yet businesses operating today need to be able to make distinctions between all the threat types out there, since each and every one poses a unique risk to enterprises. Unfortunately, many business IT departments are not prioritizing cybersecurity at all, let alone setting aside time to learn about the separate threat types that exist. The lack of a proactive cybersecurity strategy within many businesses is not just problematic — it also plainly does not make sense.
Blog

By Entrust Datacard

October 14, 2015

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Blog

By Bruce Morton

April 22, 2015

There are many risks with the implementation of security using SSL. This blog outlines SSL best practices to consider. Entrust Datacard can provide guidance and solutions to use SSL best practices and deploy SSL with confidence.
Blog

By Entrust Datacard

August 24, 2015

For many, SSL certificates are synonymous with data encryption for the Internet. The technology — which secure Web sessions for users through the secure sockets layer protocol — is widely deployed by organizations that offer e-commerce and other services. After all, when it comes to e-commerce in particular, the arena is highly vulnerable. These days, there are many examples of such platforms that have been compromised, putting customers at risk. This blog covers some examples and recommendations.
Blog

February 15, 2018

Your digital business strategy is no longer “set it and forget it.” Today’s brands must have a transparent, layered security approach that includes both evaluating the risk of the device and the identity of the purchaser.
Blog

By Diana Gruhn

June 26, 2018

Apple will join leading browser Google Chrome in enforcing a Certificate Transparency policy for all public SSL/TLS certificates issued after October 15, 2018. Websites that have certificates that are out of compliance risk their users encountering trust errors.
Blog

By Entrust Datacard

February 19, 2015

In this evolving digital environment, organizations in every industry are working to develop solutions that maximize convenience and productivity while minimizing risk. These new demands are changing the way we think about security and creating the need for end-to-end secure solutions. Just as the connectivity of our world is transforming the way we live and work, this new understanding of security is impacting the very core of how organizations operate. No matter your organization’s unique challenges, here are several key focal points for developing effective solutions.
Page 1 of 3