Quantcast
Channel: Venafi Blog
Browsing all 348 articles
Browse latest View live

Gov Info Security

Encryption: The Next Generation “While enterprises should keep an eye on advancements made in quantum computing, current research is ‘just one more evolutionary step’ toward making QKD-based systems a...

View Article


USA Today

How the NSA’s decrypting practices erodes basic trust “The consequences of a digital world without trust are not predictable, and they are very possibly catastrophic….The NSA has collected keys and...

View Article


Security Breakfast Briefing Featuring Forrester

Date: July 27 – August 1, 2013 Location: Bellevue, WA Details: The Cybercriminals’ New Weapon and Next-Generation Trust Protection Briefing

View Article

Security Dinner Briefing Featuring Forrester

Date: September 26, 2013 Location: Santa Clara, CA Details: The Cybercriminals’ New Weapon and Next-Generation Trust Protection Briefing

View Article

Gov Info Security

Keeping Communication Secure in New Era “Organizations must be aware of how they use keys and certificates and have the ability to identify risks, and respond and remediate, says Kevin Bocek,...

View Article


CSO

Google plan to thwart government surveillance with encryption raises stakes “Bocek agreed, saying that the most serious vulnerabilities are often in the systems companies use to manage the keys and...

View Article

Image may be NSFW.
Clik here to view.

PCI DSS 3.0 Sneak Peek

The Need for Greater Flexibility and an Evolving Threatscape Put Spotlight on Keys and Certificates The PCI Security Standard Council (SSC) recently previewed PCI DSS 3.0, the next update of the...

View Article

PCI DSS 3.0 Sneak Peek

View Article


Forrester Research: Attacks on Trust

Cybercriminals want access to your network. You need to not only recognize the risk of trust-based attacks but also learn how to thwart them. This study outlines practices that you can implement to...

View Article


Image may be NSFW.
Clik here to view.

Gone in 60 Months or Less

Vendors enforcing a 60-month validity period will help organizations adhere to best practices For years, cybercriminals have been taking advantage of the blind trust organizations and users place in...

View Article

16 Years of Escalating War on Trust

The 16 Years of Escalating War on Trust whitepaper takes a historical overview of the how cyber attacks have evolved, and examines how cybercriminal efforts have become increasingly complex and...

View Article

On-demand: Attacks On Trust – The Cybercriminal’s New Weapon

VIEW NOW Venafi, in collaboration with Forrester Research, Inc., presents the on-demand webinar—“Attacks On Trust: The Cybercriminal’s New Weapon”. Due to the significant rise of cybercriminal attacks...

View Article

Securing Mobile Certificates Whitepaper

The shift toward Bring Your Own Device (BYOD) has led to the rapid deployment of hundreds of thousands of mobile certificates, increasing the risk of unauthorized access to critical networks,...

View Article


Image may be NSFW.
Clik here to view.

Broken Trust – Exposing the Malicious Use of Digital Certificates and...

Digital certificates and cryptographic keys are interwoven into our everyday lives. Think about it: from accessing the Wi-Fi hotspot at your local coffee shop to flying across the county in a new...

View Article

On Demand: Broken Trust – Exposing the Malicious Use of Keys & Certificates

VIEW NOW For years, digital trust that is foundational to every business and government has been established by cryptographic keys and digital certificates. Recently, this trust has come under attack...

View Article


Cyber Defense Magazine

The “V” in Venafi is for “Very” Cool “Today, due to increased data protection requirements and security best practices, there has been a surge in certificate inventories… Failure to properly maintain...

View Article

How Edward Snowden breached security

View Article


Venafi Reveals how Edward Snowden Breached the NSA; Challenges Agency to...

NSA’s Inability to Detect and Respond to Fabricated Cryptographic Keys and Certificates Allowed Exiled Attacker to Steal Thousands of Classified Documents and Intellectual Property Salt Lake City, UT –...

View Article

Image may be NSFW.
Clik here to view.

Infographic: How Snowden Breached the NSA

How Edward Snowden did it and is your enterprise next? There’s one secret that’s still lurking at the NSA: How did Edward Snowden breach the world’s most sophisticated IT security organization? This...

View Article

On Demand: The Edward Snowden Breach – Attack Steps & Prevention

VIEW NOW According to recent Forrester Research, “Advanced threat protection provides an important layer of protection but is not a substitute for securing keys and certificates.” The critical need to...

View Article
Browsing all 348 articles
Browse latest View live