Relevant Items
Refine Search expand_more
Blog add
8 Results for 'information security'

It’s tough to make predictions…

Cryptographic experts have speculated over whether and when the quantum computer needed to execute the eponymous algorithm on numbers of the size used in present-day public-key crypto-systems will become a reality.  If and when it happens, the implications for much of the information security business will be profound.

Building Your Digital DNA: PKI and the Identity Evolution

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?

RSA Conference USA 2016 - Secure Your Place in the Cloud

Last week, information security professionals from across the globe gathered in San Francisco, Calif. for RSA Conference 2016 USA. Entrust Datacard provides an overview of the high level take-aways. 

Always-On SSL, The President Wants It Too

In June 2015, the US chief information security officer (CIO) issued a memorandum to mandate HTTPS-only to secure Federal websites and web services. This policy is also known as Always-On SSL and HTTPS everywhere. The majority of Federal websites use HTTP; however the CIO states that HTTP is susceptible to interception, manipulation and impersonation. This vulnerability can be mitigated by implementing an HTTPS-only policy which must be implemented to all existing sites and services by December 31, 2016. 

Will Passwords be Replaced with Stronger Authentication?

Identity management and authentication have long been a core aspect of information security. I think it’s safe to say that we are in the midst of real fluctuations that will fundamentally change the way organizations handle authentication in consumer, enterprise and citizen applications. Let’s take a look at what is propelling this change.

Entrust Takes Top Honors amongst Information Security Magazine and SearchSecurity.com Readers

Entrust IdentityGuard, was recently named an Information Security Magazine and SearchSecurity.com 2014 Readers’ Choice Award winner for Best Authentication . SearchSecurity.com said Entrust IdentityGuard is a truly converged solution for multifactor authentication deployment and makes the authentication experience seamless for organizations.

Cyber Incidents Increased by Two-Thirds in Last 5 Years, New Study Finds

The recently released Global State of Information Security Survey 2015 found that the number of information security incidents reported around the world rose to 42.8 million in 2014, an increase of almost 50 percent. According to the study released by Pricewaterhouse Coopers, 117,000 cyberattacks occurred each day, and detected security incidents have grown by 66 percent year-over-year since 2009. 

What is the European Union Agency for Network and Information Security (ENISA)?

Page 1 of 1