Relevant Items
Refine Search expand_more
Blog add
10 Results for 'NIC'

Telcom Industry and IoT: From ‘Can You Hear Me Now’ to Secure Service Delivery

What are the characteristics of a security solution that can address the challenges facing telecoms in their bid to capture market share of IoT projects? From a technical standpoint, the security solution needs to provide data integrity from device to the enterprise data hub. IoTrust is a security platform addressing the above challenges and can help bring your IoT product to market faster and more securely.

Building Your Digital DNA: PKI and the Identity Evolution

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?

How to Enhance Mobile Security in Health Care Organizations

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased

PROVE IT: How Identity Verification Is Making the Internet a Safer Place

Around the clock verification agents worldwide make sure that certified websites are owned and operated by legitimate, trustworthy businesses and people. Working together by establishing rules and guidelines for certificate issuance, SSL Certificate vendors make the internet a safer place to communicate, to do business and to socialize. 

Top Cybersecurity Trends to Expect in 2016

The progression of cybersecurity mostly occurs in step with the continued evolution of technology in order to ensure that every innovation is as secure as it is functional. As time passes, the level of complexity of information and communication technology continues to introduce new vulnerabilities, presenting cybersecurity professionals with unique challenges. Let's take a look at some of the top cybersecurity trends that lie in wait in 2016.

CentCom Social Media Compromised— Who Is Responsible for Your Enterprise Security?

The digital world is constantly evolving. More organizations are using mobile, cloud and social media solutions as vessels to connect and communicate with their employees, customers and citizens. Social media platforms such as Twitter, YouTube and LinkedIn provide real-time channels to communicate our news, views and also can be a critical tool for public safety used to inform the public. Last week, the announcement of an attack on US Central Command (CentCom) social media accounts made headlines.

Instant Issuance of Payment Cards through Digital Branches

Today’s consumers want their financial institution to offer services that align with their lifestyle, including engaging communications, instant service or response, multiple options and convenience. This forces organizations to constantly re-evaluate and re-vamp their existing standard operational procedures. Digital breeches are on the rise. According to Entrust Datacard, recent research reports from Euromonitor International, annual debit card payments have continued to increase by double-digits in India which will continue to be a debit card market with 90%+ card circulation within the overall card portfolio.

FCC To Hold Service Providers Accountable For Exposure of Customer Data

The Federal Communications Commission announced in late October that it will begin holding service providers responsible for security breaches affecting their customers' personal data. The agency released a statement on Oct. 24 saying it plans to fine TerraCom and Yourtel America, which are both owned and managed by the same parent company, $10 million for failing to properly secure the information of more than 300,000 customers.

POODLE Should Kill SSL 3.0

The POODLE attack (Padding Oracle On Downgraded Legacy Encryption) will allows items such as “secure” HTTP cookies or HTTP Authorization header contents to be stolen from downgraded communications. If POODLE is used against SSL 3.0, there is no workaround or corrective action that will mitigate the attack. The only solution is to stop supporting SSL 3.0. Disabling SSL 3.0 can be done either at the server or the client (e.g., browser) side. Most server administrators should consider disabling SSL 3.0.

What is SHA-2? Why Should I Care?

U.S. NIST Guidance counseled that SHA-1 should not be trusted past January 2014 for the higher level of assurance communications over the U.S. Federal Bridge PKI. Entrust Datacard covers the technical and business reasons you need to move to SHA-2 by the experts at Entrust Datacard. 
Page 1 of 1