• Four Methods to Help Stop Enterprise Breaches

    Taking a look at the past year, it's overwhelming to think about the sheer number of breaches that happened. In a world rife with cyberattacks, here are some of the steps your business can and should take in order to protect customers as well as your enterprise's own reputation.  

        in Authentication, Encryption
  • Infographic: Mapping the Path of Two-Factor Authentication

    Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset. By implementing an additional authentication wall, a company takes a vital proactive step toward making the business infrastructure safe from a malicious intrusion. However, there is an important distinction to be made between the two types of authentication tokens organizations use, as illustrated by an Entrust informational graphic:

        in Authentication
  • US Court Decision is Good News for Banking Customers

    Blogmaster Note: This was originally posted on July 17, 2012 to ComputerWorld UK’s Security Spotlight Blog. US ruling has implications for UK over bank’s liability Thefts from a construction company in Sanford, Maine might be the catalyst for much-needed improvements to banking security. The US First Circuit Court of Appeals reversed a decision that said that a bank was not

        in Fraud