Quantcast
Channel: Venafi Blog
Viewing all articles
Browse latest Browse all 348

SC Magazine

$
0
0

Web Exclusive: A Look Ahead

“Jeff Hudson: ‘Attackers will escalate their assault where they find weak encryption keys and mismanaged certificates. Every enterprise relies on hundreds and even thousands of certificates and encryption keys, but few know where each one is and how they’re used. Criminals know this and have only just begun their attacks. The techniques used by Stuxnet, Flame, and Duqu are now in the hands of common criminals and will be used for intellectual property theft and inflicting serious harm on enterprise systems.’”

Read More


Viewing all articles
Browse latest Browse all 348

Trending Articles