Quantcast
Channel: Venafi Blog
Browsing all 348 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Encrypt Like Everyone is Watching—Decrypt Like No One Is

I just attended Black Hat 2015, and what a great conference it was. I learned that “hackers,” including white hats, grey hats, and black hats, are really interesting people. At Black Hat, I saw...

View Article


Image may be NSFW.
Clik here to view.

How Are We Still Talking About Broken Trust?

We live in the age of technology. It is a fast-paced, break-neck ride to deliver great solutions—everything from the largest, complex integrated solution to the single, simple iPhone app. With online...

View Article


Superfish: One Step Closer to Sinking our Boat

Original article published at Infosecurity Magazine on August 25, 2015: http://www.infosecurity-magazine.com/opinions/superfish-one-step-closer/ Earlier this year Lenovo got caught installing Superfish...

View Article

Image may be NSFW.
Clik here to view.

Research: Clueless Enterprises Miss Certificate Breaches

This article was originally posted by IDG Connect on August 5, 2015 at: http://www.idgconnect.com/abstract/10251/research-clueless-enterprises-miss-certificate-breaches Attacks on digital keys and...

View Article

Image may be NSFW.
Clik here to view.

For the 2nd Year Running, PCI SSC Announces Securing Keys and Certificates a...

There has been a dramatic increase in attacks that leverage keys and certificates, and the recent breadth and criticality of vulnerabilities, from Heartbleed to POODLE, underscore the importance of...

View Article


Image may be NSFW.
Clik here to view.

The Wild West of Encryption: A Holdup for Keys and Certificates

During my time at PGP which was run by some of the most passionate security trailblazer’s of their time, part of the fight was trying to teach the world that they should encrypt their data. Time and...

View Article

Image may be NSFW.
Clik here to view.

Still Using SHA-1? It’s Time to Switch!

Why all of the fuss? SHA-1 was deprecated by NIST from 2011 through 2013 because of its security strength being susceptible to a collision attack. Due to ever increasing computational power, the risk...

View Article

Image may be NSFW.
Clik here to view.

Untrusted Certificates—Survey Shows IT Security Pros Know the Risks but Do...

Today, Venafi released a report based on survey findings and analysis, IT Security Professionals Know the Risk of Untrusted Certificates and Issuers, but Do Nothing. The survey was conducted at 2015...

View Article


Image may be NSFW.
Clik here to view.

Biometrics Stolen During OPM Breach—Your Fingerprints May No Longer Be Your Own

During what is believed to be the biggest breach in U.S. history, it was reported that along with all of the other sensitive data, over 5.6 million fingerprints were also exposed to the hackers. While...

View Article


Image may be NSFW.
Clik here to view.

Venafi Supports Google Certificate Transparency with CA-Agnostic Log and...

Venafi is proud to announce the availability of the Venafi CT log and CT monitor. Key Takeaways Google Certificate Transparency provides safer internet browsing by allowing anyone to scrutinize the...

View Article

Key and Certificate Security Delivered at the Speed of Business

Stop keys and certificates from slowing innovation. The speed of cloud computing, the demands of internal IT services SLAs, and the explosion of IoT devices must be supported with automated key and...

View Article

Image may be NSFW.
Clik here to view.

Take the Guesswork and Complexity Out of Your PKI Update

If your public key infrastructure (PKI) is like that of most companies today, it’s probably outdated. That can be a serious problem. Outdated PKI systems result in errors, missed updates, costly...

View Article

Image may be NSFW.
Clik here to view.

Don’t Trust Blindly—Get 20/20 Vision on Your Certificates

Before your view becomes 20/20 from hindsight and you are too little too late, adopt an approach that gives 100% insight. Virtually all enterprises are unaware of how many certificates they have in...

View Article


Image may be NSFW.
Clik here to view.

Businesses Are Losing Customers from the Misuse of Keys and Certificates

2015 survey results reveal that unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches. Key Takeaways Most businesses...

View Article

Image may be NSFW.
Clik here to view.

Infographic: New Ponemon Research Reveals Businesses Are Losing Customers Due...

A new report, 2015 Cost of Failed Trust Report: When Trust Online Breaks, Businesses Lose Customers, was released today by the Ponemon Institute and Venafi, and reveals the damaging impacts on global...

View Article


Image may be NSFW.
Clik here to view.

Why the Security Workforce Needs Qualified Women….AND Men

Over the past 30 years of being in information technology and security, it has always been obvious that there is a huge need for diversity in this field. It’s a common topic that comes up often,...

View Article

Image may be NSFW.
Clik here to view.

Securing Online Gaming with the Immune System for the Internet

The Cyber Spotlight: Securing Online Gaming 2015 event is happening on October 6th in London, UK. It is a one day event focusing on threats and solutions pertaining specifically to online gaming....

View Article


Image may be NSFW.
Clik here to view.

Here’s How to Secure the Internet’s Shaky Foundation

The foundation of the internet, DNS and PKI-SSL, is now threatened by attacks using SSL/TLS keys and certificates. We need an Immune System for the Internet to identify and neutralize key and...

View Article

Image may be NSFW.
Clik here to view.

Infographic: New SANS 20 Requirements for SSL/TLS Security and Management

The SANS Institute, realizing the critical nature of security risks to SSL/TLS, has added several requirements related to SSL/TLS management to Critical Security Control 17: Data Protection. From...

View Article

Image may be NSFW.
Clik here to view.

The Internet of Things: It’s All About Trust

The original article was published at Dark Reading on October 16, 2015. As billions of devices come online, it will be critical to protect the keys and certificates we use for authentication,...

View Article
Browsing all 348 articles
Browse latest View live