Quantcast
Channel: Venafi Blog
Browsing all 348 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Is Your SSL/TLS Encryption Creating Security Blind Spots?

Businesses are increasing their use of SSL/TLS. This is being driven by the growth of cyberattacks as well as concerns and regulations over data privacy. Also, Google is prioritizing search results for...

View Article


Image may be NSFW.
Clik here to view.

Are You Smarter than a Hacker? Show Off Your Knowledge on Trust-based Attacks

This is the 4th year running that Venafi has hosted a game show at the annual RSA Conference. Participants get a chance to show off their knowledge of today’s threatscape and the latest methods of...

View Article


Image may be NSFW.
Clik here to view.

Data Protection Begins and Ends with Trusted Keys and Certificates

According to Gartner, encrypted traffic now comprises 15%-25% of total web traffic today. But for many businesses, it’s over 50%. The adoption of Transport Layer Security (TLS), and its predecessor...

View Article

Image may be NSFW.
Clik here to view.

$600 Million Dollar Question: Is Your Company’s IAM MIA? 

Today, an increasing number of Identity and Access Management (IAM) strategies include the cryptographic keys and digital certificates for SSL/TLS, SSH, mobile WiFi, and VPN access that authenticate...

View Article

Image may be NSFW.
Clik here to view.

Take the Guesswork and Complexity Out of Your PKI Update

If your public key infrastructure (PKI) is like that of most companies today, it’s probably outdated. That can be a serious problem. Outdated PKI systems result in errors, missed updates, costly...

View Article


Image may be NSFW.
Clik here to view.

Automate Key and Certificate Management for Optimized Application Delivery

Businesses rely heavily upon SSL/TLS certificates to encrypt data and authenticate systems and applications – both inside and outside the corporate network. The use of keys and certificates will...

View Article

Heal Your Broken Online Trust with an Immune System

In 2014, Keren Elazari, an expert Cyber Security Researcher, started speaking to us via her TED talk about how hackers are like the internet’s immune system. She has led the way in this concept and...

View Article

Image may be NSFW.
Clik here to view.

Are Your Partners Creating a Hole in Your Security?

No matter how secure your environment, cybercriminals will bypass your security defenses, making how quickly you can detect the breach and respond to mitigate the damage a critical component of your...

View Article


Image may be NSFW.
Clik here to view.

Security Pros (Blindly) Trust Keys and Certificates

A Venafi Survey of Nearly 850 IT Security Professionals Finds Gaps in Detection and Response to Key and Certificate Vulnerabilities Attacks on keys and certificates are unlike other common cyber...

View Article


Image may be NSFW.
Clik here to view.

Examining the Impact of the OMB and Congress’ Moves to Add More...

On the heels of the U.S government’s Office of Personnel Management (OPM) breach last week and other recent examples of cyber attacks involving the malicious use of keys and certificates, it's not that...

View Article

Image may be NSFW.
Clik here to view.

Businesses Need to Act Fast to Regain Online Trust

The Internet is the life blood for today’s business. Billions of dollars in market capitalization have been built on the back of innovation and productivity gains from the Internet and connected...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Arm Your Incident Response Team for Rapid Key and Certificate...

Your network has been attacked and your security is compromised. Your incident response (IR) team goes to work trying to discover the cause of the breach and restore your organization’s equilibrium—the...

View Article

Image may be NSFW.
Clik here to view.

Why Strategic Investors Support Venafi as the Immune System for the Internet...

Today we are announcing that Venafi has received $39M in new funding from strategic investors: Intel Capital, Silver Lake Waterman, QuestMark Partners, Foundation Capital, Pelion Venture Partners, and...

View Article


Image may be NSFW.
Clik here to view.

New PCI DSS v3.1 SSL/TLS Requirements—But Many Aren’t Compliant with PCI DSS...

The Payment Card Industry Data Security Standard (PCI DSS) version 3.1 was released in April 2015. Yet, many organizations are still not compliant with the PCI DSS version 3.0, which went into effect...

View Article

Image may be NSFW.
Clik here to view.

The Real Big Story Behind July’s OpenSSL Vulnerability: Why Blind Trust in...

Certificate reputation services can end the risk that certificate validation app developers face (and are not doing a good job of addressing) The OpenSSL team has released a fix for a critical...

View Article


Image may be NSFW.
Clik here to view.

Poor Privileged Access Management Poses Big Security Problems

With endless headlines touting the latest costly security breach, you would think that enterprises would be scrupulous about guarding the “keys to their kingdom.” Think again. The keys to the...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Briefings on Cryptographic Keys and Digital Certificates

Black Hat USA 2015 is right around the corner and it’s time to start planning which briefings to attend. Here at Venafi, we’re interested in sessions on protecting cryptographic keys and digital...

View Article


Image may be NSFW.
Clik here to view.

Meet Us at Black Hat 2015: Blue Coat and Venafi Security Experts Discuss How...

It’s going to be an exciting week at Black Hat USA 2015 and we are certainly looking forward to it!  Venafi is teaming up with Blue Coat to conduct a technical briefing at Black Hat on how to eliminate...

View Article

Contemplating Health Analogies in Cyber Security & Why We Need The Immune...

Over the past 30 years, we’ve seen many health analogies used across the entire cyber security industry. If you think about it, it does make a lot of sense: just as viruses make humans sick, they too...

View Article

Image may be NSFW.
Clik here to view.

IT Security:  ♫ It’s all About the Basics, ‘Bout the Basics, No Trouble ♫

Okay—stop laughing, everyone (and I mean everyone) knows I am no singer, but IT Security professionals really need to ensure they have the basics in place and I liked the attention this title brought...

View Article
Browsing all 348 articles
Browse latest View live