Gov Info Security
Encryption: The Next Generation “While enterprises should keep an eye on advancements made in quantum computing, current research is ‘just one more evolutionary step’ toward making QKD-based systems a...
View ArticleUSA Today
How the NSA’s decrypting practices erodes basic trust “The consequences of a digital world without trust are not predictable, and they are very possibly catastrophic….The NSA has collected keys and...
View ArticleSecurity Breakfast Briefing Featuring Forrester
Date: July 27 – August 1, 2013 Location: Bellevue, WA Details: The Cybercriminals’ New Weapon and Next-Generation Trust Protection Briefing
View ArticleSecurity Dinner Briefing Featuring Forrester
Date: September 26, 2013 Location: Santa Clara, CA Details: The Cybercriminals’ New Weapon and Next-Generation Trust Protection Briefing
View ArticleGov Info Security
Keeping Communication Secure in New Era “Organizations must be aware of how they use keys and certificates and have the ability to identify risks, and respond and remediate, says Kevin Bocek,...
View ArticleCSO
Google plan to thwart government surveillance with encryption raises stakes “Bocek agreed, saying that the most serious vulnerabilities are often in the systems companies use to manage the keys and...
View ArticlePCI DSS 3.0 Sneak Peek
The Need for Greater Flexibility and an Evolving Threatscape Put Spotlight on Keys and Certificates The PCI Security Standard Council (SSC) recently previewed PCI DSS 3.0, the next update of the...
View ArticleForrester Research: Attacks on Trust
Cybercriminals want access to your network. You need to not only recognize the risk of trust-based attacks but also learn how to thwart them. This study outlines practices that you can implement to...
View ArticleGone in 60 Months or Less
Vendors enforcing a 60-month validity period will help organizations adhere to best practices For years, cybercriminals have been taking advantage of the blind trust organizations and users place in...
View Article16 Years of Escalating War on Trust
The 16 Years of Escalating War on Trust whitepaper takes a historical overview of the how cyber attacks have evolved, and examines how cybercriminal efforts have become increasingly complex and...
View ArticleOn-demand: Attacks On Trust – The Cybercriminal’s New Weapon
VIEW NOW Venafi, in collaboration with Forrester Research, Inc., presents the on-demand webinar—“Attacks On Trust: The Cybercriminal’s New Weapon”. Due to the significant rise of cybercriminal attacks...
View ArticleSecuring Mobile Certificates Whitepaper
The shift toward Bring Your Own Device (BYOD) has led to the rapid deployment of hundreds of thousands of mobile certificates, increasing the risk of unauthorized access to critical networks,...
View ArticleBroken Trust – Exposing the Malicious Use of Digital Certificates and...
Digital certificates and cryptographic keys are interwoven into our everyday lives. Think about it: from accessing the Wi-Fi hotspot at your local coffee shop to flying across the county in a new...
View ArticleOn Demand: Broken Trust – Exposing the Malicious Use of Keys & Certificates
VIEW NOW For years, digital trust that is foundational to every business and government has been established by cryptographic keys and digital certificates. Recently, this trust has come under attack...
View ArticleCyber Defense Magazine
The “V” in Venafi is for “Very” Cool “Today, due to increased data protection requirements and security best practices, there has been a surge in certificate inventories… Failure to properly maintain...
View ArticleVenafi Reveals how Edward Snowden Breached the NSA; Challenges Agency to...
NSA’s Inability to Detect and Respond to Fabricated Cryptographic Keys and Certificates Allowed Exiled Attacker to Steal Thousands of Classified Documents and Intellectual Property Salt Lake City, UT –...
View ArticleInfographic: How Snowden Breached the NSA
How Edward Snowden did it and is your enterprise next? There’s one secret that’s still lurking at the NSA: How did Edward Snowden breach the world’s most sophisticated IT security organization? This...
View ArticleOn Demand: The Edward Snowden Breach – Attack Steps & Prevention
VIEW NOW According to recent Forrester Research, “Advanced threat protection provides an important layer of protection but is not a substitute for securing keys and certificates.” The critical need to...
View Article