It’s Time to See Mobility in a New Light
While more and more employees are using their own phones, tablets, and other mobile devices for work, these practices often keep enterprises in the dark about mobile device access to enterprise data...
View ArticleThere is Security Kryptonite on Your Sticky Note
I've had the pleasure of working with a lot of security professionals in my time with security software and there is a reoccurring trend: People have an inherent craving for simplicity and often give...
View ArticleThe New NIST Paper on SSH Needs to Be at the Top of Your Reading List
Virtually every enterprise uses Secure Shell (SSH) as the administrative protocol for secure, remote access to nearly all mission-critical systems. If it’s not Windows or a mainframe, then SSH is used...
View ArticleLIVE SANS Webinar—Securing SSH Itself with the Critical Security Controls
SANS Institute and Venafi are cohosting a live webinar this Wednesday on the Secure Shell (SSH) network protocol, its vulnerabilities, and how organizations can address these vulnerabilities using SANS...
View Article2015 Retrospective Part 1: 6 Out of 8 Venafi 2015 Cybersecurity Predictions...
It’s that time of the year again: security “predictions” season. But before sharing our 2016 predictions (coming soon), we first want to look back at how we did with our 2015 predictions. What’s our...
View ArticleTop 6 Venafi 2016 Cybersecurity Predictions: More Encryption Equates to More...
What are the Venafi cybersecurity predictions for 2016? First we must take a quick look at where 2015 has brought us—there were increases in both the use of encryption and in attacks on cryptographic...
View ArticleNew Data Confirms Venafi Analysis that Secretary Clinton’s Email Server Did...
Newly released emails corroborate the forensic analysis conducted by Venafi TrustNet certificate reputation service which concluded that Secretary of State Hillary Clinton did not use encryption on her...
View Article2015 Retrospective Part 2: Venafi Was Painfully Accurate When We Predicted...
We correctly called 6 of the 8 predictions we made for 2015, which isn't bad. But we were absolutely 100% accurate on our overall prediction that attacks impacting the foundation of online...
View ArticleVenafi Analysis of Snowden NSA Breach Confirmed – 2 Years Later
It's been more than two years since Venafi publicly announced our analysis that Edward Snowden used the NSA's own cryptographic keys and digital certificates to steal the agency's classified data. The...
View ArticleInternet of Things: The Dangers of Blindly Trusting Keys and Certificates
Originally published as Rise of the Robots: How our love affair with automation could spell the end in Computer Business Review on January 13, 2016. There's an old adage which began its life back in...
View ArticleTed Koppel Predicts “Lights Out” in U.S. While Ukraine Power Grid Goes Down
On December 23, 2015, the power grid in the Ukraine was hit with a cyberattack. The outage left a large region of Ivano-Frankivsk without power as a substation went down. They were able to get back...
View ArticleVenafi POV - AWS Certificate Manager Speeds Encryption Yet Still Requires...
SSL/TLS certificates are often used with Amazon Web Services (AWS) to encrypt and secure transactions. However, the time it takes to provision, install, and manage SSL/TLS certificates can hinder the...
View ArticleUnplanned Outages Are Painful: The Unsexy Security Story that Everyone Should...
Say it with me—UNPLANNED OUTAGES ARE PAINFUL! Of course, we all know this. The question is, do we all know why they happen and how to prevent them? Most likely not. Outages, also referred to as...
View ArticleUsing Certificates to Secure the Rising Tide of Mobile Apps
Those who have been in the IT industry for 20 years or more will have witnessed enough changes to fill the sea twice over. Each change is necessary, but some are more interesting than others. For...
View ArticleVenafi at RSA Conference 2016: Bringing You the Best in Internet Security
We are ready to see you at RSA Conference 2016 in San Francisco. We’re bringing in the team from around the US, including our CIO/CISO Tammy Moskites, so we’re ready to talk and help you understand how...
View ArticleInternet Hijacked: If Hacked by Government Access Using Apple Code-signing...
The FBI wants Apple to break our system of trust A California magistrate has ordered Apple to help the FBI gain access to an iPhone that was used by one of the terrorists in the 2015 San Bernardino...
View ArticleVenafi at RSA 2016: Breaking Closed Systems with Code-Signing
There is an abundance of use cases in which code signing using certificates has become more critical to prove to end users that they can trust the source and the integrity of the installed code. From...
View ArticleCIOs Wasting Millions on Cybersecurity that Doesn’t Work: Keys and...
Top CIOs acknowledge they are wasting millions (take your pick – BSPs, EURs, or USDs) on layered security defences because these technologies blindly trust keys and certificates, according to research...
View ArticleInfographic: Crumbling Cybersecurity—CIOs Are Wasting Millions
CIOs admit to wasting millions on inadequate security controls. Why? There is a fundamental flaw in their cybersecurity strategy that is letting cybercriminals bypass their defenses in over half of...
View ArticleRSA 2016: Threats to Cybersecurity Are Making Headlines
RSA 2106 did indeed shape up to be an interesting event. With a hospital in Los Angeles being held hostage by hackers with ransomware and Apple defending its operating system against the federal...
View Article