Entrust Identity On Blog

  • Internet of Things – Beware

    We are now moving into the deployment of the Internet of Things (IoT). IoT is an attempt to attach uniquely identifiable devices to the existing Internet infrastructure. The connected devices will allow you to receive better information, control items and, simply, just do fun stuff. How many will be connected by 2020? Gartner estimates 26 billion devices and ABI Research

        in Cloud Security
    0
  • Restaurant Hacker from 2010 Finally Captured

    It is rare that a hacker is captured, but when one is, it's headline news. Does the story of an apprehended cybercriminal get such airtime because it's big news, or because it happens so rarely? From our point of view, it's safe to say it's that latter reason. The rarity with which cybercriminals are captured means that enterprises need security.

        in Authentication, Data Breach
    0
  • New Banking Malware Poses Big Threat

    When authorities try to suppress malware authors, those criminals simply return to the drawing board and develop something bigger, stronger, and more impenetrable. This is a system that certainly favors the criminal, and security workers are finding it harder and harder to keep the malicious elements at bay.

        in Authentication, Encryption, Fraud, Fraud Detection, Identity Assurance, Malware
    0
  • A Breach Can Happen in an Instant

    One stolen laptop. One disgruntled employee. Oftentimes, this is all it takes for an enterprise security breach to begin. Although the cybercrimes that most often make headlines are the ones carried out by major criminals, the truth is that security episodes start where you'd least expect them

        in Authentication, Data Breach
    0
  • New Banking Malware Poses Big Threat

    When authorities try to suppress malware authors, those criminals simply return to the drawing board and develop something bigger, stronger, and more impenetrable. This is a system that certainly favors the criminal, and security workers are finding it harder and harder to keep the malicious elements at bay.

        in Authentication, Encryption, Fraud, ...
    0
  • A Breach Can Happen in an Instant

    One stolen laptop. One disgruntled employee. Oftentimes, this is all it takes for an enterprise security breach to begin. Although the cybercrimes that most often make headlines are the ones carried out by major criminals, the truth is that security episodes start where you'd least expect them

        in Authentication, Data Breach
    0
Page 1 of 112123...5101520...»»