Quantcast
Channel: Venafi Blog
Browsing all 348 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

It’s Time to See Mobility in a New Light

While more and more employees are using their own phones, tablets, and other mobile devices for work, these practices often keep enterprises in the dark about mobile device access to enterprise data...

View Article


Image may be NSFW.
Clik here to view.

There is Security Kryptonite on Your Sticky Note

I've had the pleasure of working with a lot of security professionals in my time with security software and there is a reoccurring trend: People have an inherent craving for simplicity and often give...

View Article


Image may be NSFW.
Clik here to view.

The New NIST Paper on SSH Needs to Be at the Top of Your Reading List

Virtually every enterprise uses Secure Shell (SSH) as the administrative protocol for secure, remote access to nearly all mission-critical systems. If it’s not Windows or a mainframe, then SSH is used...

View Article

Image may be NSFW.
Clik here to view.

LIVE SANS Webinar—Securing SSH Itself with the Critical Security Controls

SANS Institute and Venafi are cohosting a live webinar this Wednesday on the Secure Shell (SSH) network protocol, its vulnerabilities, and how organizations can address these vulnerabilities using SANS...

View Article

2015 Retrospective Part 1: 6 Out of 8 Venafi 2015 Cybersecurity Predictions...

It’s that time of the year again: security “predictions” season. But before sharing our 2016 predictions (coming soon), we first want to look back at how we did with our 2015 predictions.  What’s our...

View Article


Image may be NSFW.
Clik here to view.

Top 6 Venafi 2016 Cybersecurity Predictions: More Encryption Equates to More...

What are the Venafi cybersecurity predictions for 2016? First we must take a quick look at where 2015 has brought us—there were increases in both the use of encryption and in attacks on cryptographic...

View Article

Image may be NSFW.
Clik here to view.

New Data Confirms Venafi Analysis that Secretary Clinton’s Email Server Did...

Newly released emails corroborate the forensic analysis conducted by Venafi TrustNet certificate reputation service which concluded that Secretary of State Hillary Clinton did not use encryption on her...

View Article

Image may be NSFW.
Clik here to view.

2015 Retrospective Part 2: Venafi Was Painfully Accurate When We Predicted...

We correctly called 6 of the 8 predictions we made for 2015, which isn't bad. But we were absolutely 100% accurate on our overall prediction that attacks impacting the foundation of online...

View Article


Image may be NSFW.
Clik here to view.

Venafi Analysis of Snowden NSA Breach Confirmed – 2 Years Later

It's been more than two years since Venafi publicly announced our analysis that Edward Snowden used the NSA's own cryptographic keys and digital certificates to steal the agency's classified data. The...

View Article


Image may be NSFW.
Clik here to view.

Internet of Things: The Dangers of Blindly Trusting Keys and Certificates

Originally published as Rise of the Robots: How our love affair with automation could spell the end in Computer Business Review on January 13, 2016. There's an old adage which began its life back in...

View Article

Image may be NSFW.
Clik here to view.

Ted Koppel Predicts “Lights Out” in U.S. While Ukraine Power Grid Goes Down

On December 23, 2015, the power grid in the Ukraine was hit with a cyberattack. The outage left a large region of Ivano-Frankivsk without power as a substation went down. They were able to get back...

View Article

Venafi POV - AWS Certificate Manager Speeds Encryption Yet Still Requires...

SSL/TLS certificates are often used with Amazon Web Services (AWS) to encrypt and secure transactions. However, the time it takes to provision, install, and manage SSL/TLS certificates can hinder the...

View Article

Image may be NSFW.
Clik here to view.

Unplanned Outages Are Painful: The Unsexy Security Story that Everyone Should...

Say it with me—UNPLANNED OUTAGES ARE PAINFUL!  Of course, we all know this. The question is, do we all know why they happen and how to prevent them? Most likely not. Outages, also referred to as...

View Article


Image may be NSFW.
Clik here to view.

Using Certificates to Secure the Rising Tide of Mobile Apps

Those who have been in the IT industry for 20 years or more will have witnessed enough changes to fill the sea twice over. Each change is necessary, but some are more interesting than others. For...

View Article

Image may be NSFW.
Clik here to view.

Venafi at RSA Conference 2016: Bringing You the Best in Internet Security

We are ready to see you at RSA Conference 2016 in San Francisco. We’re bringing in the team from around the US, including our CIO/CISO Tammy Moskites, so we’re ready to talk and help you understand how...

View Article


Image may be NSFW.
Clik here to view.

Internet Hijacked: If Hacked by Government Access Using Apple Code-signing...

The FBI wants Apple to break our system of trust A California magistrate has ordered Apple to help the FBI gain access to an iPhone that was used by one of the terrorists in the 2015 San Bernardino...

View Article

Image may be NSFW.
Clik here to view.

Venafi at RSA 2016: Breaking Closed Systems with Code-Signing

There is an abundance of use cases in which code signing using certificates has become more critical to prove to end users that they can trust the source and the integrity of the installed code. From...

View Article


Image may be NSFW.
Clik here to view.

CIOs Wasting Millions on Cybersecurity that Doesn’t Work: Keys and...

Top CIOs acknowledge they are wasting millions (take your pick – BSPs, EURs, or USDs) on layered security defences because these technologies blindly trust keys and certificates, according to research...

View Article

Image may be NSFW.
Clik here to view.

Infographic: Crumbling Cybersecurity—CIOs Are Wasting Millions

CIOs admit to wasting millions on inadequate security controls. Why? There is a fundamental flaw in their cybersecurity strategy that is letting cybercriminals bypass their defenses in over half of...

View Article

Image may be NSFW.
Clik here to view.

RSA 2016: Threats to Cybersecurity Are Making Headlines

RSA 2106 did indeed shape up to be an interesting event. With a hospital in Los Angeles being held hostage by hackers with ransomware and Apple defending its operating system against the federal...

View Article
Browsing all 348 articles
Browse latest View live