Encrypt Like Everyone is Watching—Decrypt Like No One Is
I just attended Black Hat 2015, and what a great conference it was. I learned that “hackers,” including white hats, grey hats, and black hats, are really interesting people. At Black Hat, I saw...
View ArticleHow Are We Still Talking About Broken Trust?
We live in the age of technology. It is a fast-paced, break-neck ride to deliver great solutions—everything from the largest, complex integrated solution to the single, simple iPhone app. With online...
View ArticleSuperfish: One Step Closer to Sinking our Boat
Original article published at Infosecurity Magazine on August 25, 2015: http://www.infosecurity-magazine.com/opinions/superfish-one-step-closer/ Earlier this year Lenovo got caught installing Superfish...
View ArticleResearch: Clueless Enterprises Miss Certificate Breaches
This article was originally posted by IDG Connect on August 5, 2015 at: http://www.idgconnect.com/abstract/10251/research-clueless-enterprises-miss-certificate-breaches Attacks on digital keys and...
View ArticleFor the 2nd Year Running, PCI SSC Announces Securing Keys and Certificates a...
There has been a dramatic increase in attacks that leverage keys and certificates, and the recent breadth and criticality of vulnerabilities, from Heartbleed to POODLE, underscore the importance of...
View ArticleThe Wild West of Encryption: A Holdup for Keys and Certificates
During my time at PGP which was run by some of the most passionate security trailblazer’s of their time, part of the fight was trying to teach the world that they should encrypt their data. Time and...
View ArticleStill Using SHA-1? It’s Time to Switch!
Why all of the fuss? SHA-1 was deprecated by NIST from 2011 through 2013 because of its security strength being susceptible to a collision attack. Due to ever increasing computational power, the risk...
View ArticleUntrusted Certificates—Survey Shows IT Security Pros Know the Risks but Do...
Today, Venafi released a report based on survey findings and analysis, IT Security Professionals Know the Risk of Untrusted Certificates and Issuers, but Do Nothing. The survey was conducted at 2015...
View ArticleBiometrics Stolen During OPM Breach—Your Fingerprints May No Longer Be Your Own
During what is believed to be the biggest breach in U.S. history, it was reported that along with all of the other sensitive data, over 5.6 million fingerprints were also exposed to the hackers. While...
View ArticleVenafi Supports Google Certificate Transparency with CA-Agnostic Log and...
Venafi is proud to announce the availability of the Venafi CT log and CT monitor. Key Takeaways Google Certificate Transparency provides safer internet browsing by allowing anyone to scrutinize the...
View ArticleKey and Certificate Security Delivered at the Speed of Business
Stop keys and certificates from slowing innovation. The speed of cloud computing, the demands of internal IT services SLAs, and the explosion of IoT devices must be supported with automated key and...
View ArticleTake the Guesswork and Complexity Out of Your PKI Update
If your public key infrastructure (PKI) is like that of most companies today, it’s probably outdated. That can be a serious problem. Outdated PKI systems result in errors, missed updates, costly...
View ArticleDon’t Trust Blindly—Get 20/20 Vision on Your Certificates
Before your view becomes 20/20 from hindsight and you are too little too late, adopt an approach that gives 100% insight. Virtually all enterprises are unaware of how many certificates they have in...
View ArticleBusinesses Are Losing Customers from the Misuse of Keys and Certificates
2015 survey results reveal that unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches. Key Takeaways Most businesses...
View ArticleInfographic: New Ponemon Research Reveals Businesses Are Losing Customers Due...
A new report, 2015 Cost of Failed Trust Report: When Trust Online Breaks, Businesses Lose Customers, was released today by the Ponemon Institute and Venafi, and reveals the damaging impacts on global...
View ArticleWhy the Security Workforce Needs Qualified Women….AND Men
Over the past 30 years of being in information technology and security, it has always been obvious that there is a huge need for diversity in this field. It’s a common topic that comes up often,...
View ArticleSecuring Online Gaming with the Immune System for the Internet
The Cyber Spotlight: Securing Online Gaming 2015 event is happening on October 6th in London, UK. It is a one day event focusing on threats and solutions pertaining specifically to online gaming....
View ArticleHere’s How to Secure the Internet’s Shaky Foundation
The foundation of the internet, DNS and PKI-SSL, is now threatened by attacks using SSL/TLS keys and certificates. We need an Immune System for the Internet to identify and neutralize key and...
View ArticleInfographic: New SANS 20 Requirements for SSL/TLS Security and Management
The SANS Institute, realizing the critical nature of security risks to SSL/TLS, has added several requirements related to SSL/TLS management to Critical Security Control 17: Data Protection. From...
View ArticleThe Internet of Things: It’s All About Trust
The original article was published at Dark Reading on October 16, 2015. As billions of devices come online, it will be critical to protect the keys and certificates we use for authentication,...
View Article