Embracing change and resilience became the mantra for business continuity as organizations powered through the pandemic. Incorporating digital technologies were critical to quickly adapt to and address employee and customer needs, economic uncertainty,…
Tag: PKI
Global Security News, North America
Securing DevOps amid digital transformation
by Help Net Security •
There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to simply as “the cloud” in the late 2010s. Today, the hottest catchphrase in t…
Europe, Global Security News, North America
Rising Above Complexity to Secure IoT Devices
by Mike Nelson •
The internet of things (IoT) has truly come of age, and innovative new use cases are emerging all around us. Each day, we’re seeing the IoT in businesses and factories, cities, vehicles and transportation systems—and in our daily lives. Studies show t…
Global Security News, North America
When protecting and managing digital identities, orchestration and automation are critical
by Helga Labus •
In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital identities and what they can do to overcome them. The rapid shift to hybrid wor…
Security Bloggers
Spotlight: COVID, Cloud Sovereignty and Other 2022 Trends with DigiCert
by Paul Roberts •
What does 2022 have in store? Dean Coclin of DigiCert speaks with host Paul Roberts about the trends that will shape the New Year, from cloud sovereignty to the growing reliance on PKI to secure digital identities, DEVOPs and more.
The post Spotlight:…
Global Security News, North America
Enterprise PKI automation: The modern approach to certificate lifecycle management
by Help Net Security •
Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In the wake of this identity explosion, it has never been more important for IT …
Global Security News, North America
EU key management in 2022
by Help Net Security •
It was reported that the private key used to sign EU Digital Covid certificates (aka “vaccine passports”) was leaked and circulated on messaging apps and online data breach marketplaces. The key was misused to generate certificates for Adolf Hitler, Mi…
Global Security News, North America
Researchers shed light on hidden root CAs
by Zeljka Zorz •
How widespread is the use of hidden root CAs and certificates signed by them? To answer that and other questions, a group of researchers from several Chinese and U.S. universities and Qihoo 360, the company developing the 360 Secure Browser, have colle…
Global Security News, North America
Lack of resources and skills continues to challenge PKI deployment
by Help Net Security •
Driven by organizational changes, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, while the related skills to manage PKI are in historically short supply, according to a research from Ponemon Institute….
Security Bloggers
Episode 230: Are Vaccine Passports Cyber Secure?
by Paul Roberts •
In this episode of the podcast (#230) Siddarth Adukia, a regional Director at NCC Group, joins host Paul Roberts to talk about the (cyber) risks and (public health) rewards of vaccine passport systems: how they work, how they can be compromised and wha…
Security Bloggers
Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion
by Paul Roberts •
Brian Trzupek of DigiCert joins Paul to talk about the findings of a recent State of PKI Automation survey and the challenges of managing fast-growing population of tens of thousands of PKI certificates.
The post Spotlight: Automation Beckons as DevOps…
Europe, Global Security News, North America
Securing Networks in a Perimeterless World
by Tim Callan •
The network perimeter—as it is traditionally understood—is dead. Firewalls were once considered the pinnacle of cybersecurity: erect a strong enough one around the network and everything inside will be secure. Unfortunately, that was probably never tr…