Border Security Strengthened by Automated Airport System
For busy travel hub Midway International Airport in Chicago, the recent implementation of automated kiosks will speed up travel time.
The Identity Context
This entry is part 3 of 3 in the series Identity Context: Defense’s Next PlayPart Three: The Identity Context All attacks involve some form of stolen identity. According to Mandiant’s threat landscape study, 100 percent of breaches they investigated involve stolen credentials. In our own studies — where we reverse-engineered malware and studied the source [Read More...]
What is the European Union Agency for Network and Information Security (ENISA)?
In order to get a good sense of what the European Union Agency for Network and Information Security (ENISA) does, think of the Internet as a giant body that is constantly fighting attacks from viruses. In this example, ENISA is like a team of doctors that watches over the Internet and advises European Member States, [Read More...]
U.K.’s Financial Policy Committee Prepping Banks for Advanced Cyber Attacks
The U.K. is currently taking active measures to prepare its financial sector with solutions for dealing with massive cyberattacks. Recently, banks have requested to conform to new guidelines imposed by the U.K.’s Financial Policy Committee (FPC), a government group in charge of monitoring both the Bank of England as well as the economy. On Oct. [Read More...]
What is the North American Electric Reliability Corporation (NERC?)
Throughout North America there runs an interconnected network of electricity comprised of transmission and control centers referred to as the bulk electric system. The bulk electric system is directly responsible for providing generation resources to local electrical systems located throughout the continent. In the United States, bulk power is regulated, monitored and protected by the [Read More...]
Entrust Goes Global to Demonstrate eID, ePassport and Law Enforcement Security Solutions
Entrust’s technology and expertise has long been used in the most advanced, cryptographically secure travel document deployments across the globe. As the global leader in eID and ePassport technology, Entrust strives to protect enterprises and governments from the constantly evolving threat landscape. So, how does one stay ahead in an industry that is constantly changing? [Read More...]
Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.
What is PIV-I?
I have been involved with credentialing in the Federal Government for many years, coming on multiple decades to be honest, and it has been an interesting ride. Over the last few years there has been a substantial change, starting with the signing of HSPD-12 in 2004. What HSPD-12 did was to codify credential issuance within the Federal Government. HSPD-12 brought in not just [Read More...]
Entrust CEO Talks Credentials, Border Security at INTERPOL General Assembly
Entrust President and CEO Bill Conner was center stage for the world’s top law enforcement officials this week. On Monday, Conner spoke to global security leaders during INTERPOL’s 79th General Assembly in Doha, Qatar. Conner emphasized the seriousness of the current identity fraud threat landscape, and also outlined the multipurpose smartcard credentialsEntrust recently developed to properly secure [Read More...]
Entrust Provides Expertise on Border Security, Malware Defense at Hong Kong INTERPOL Conference
Entrust’s Mark Joynes spoke today at the first INTERPOL Information Security Conference (IISC) in Hong Kong. The three-day event, co-hosted by INTERPOL and the Hong Kong Police, addresses the importance of specific solutions that help solve critical border security challenges and defend against advanced malware attacks.