Mobile Security: An Often Overlooked Area in Your Business

With the advent of advanced smartphones, our communities and businesses have become more mobile than ever before in the last decade. The ease of operations along with instant access to the resources has totally changed the way we see work now. Surprisi… Continue reading Mobile Security: An Often Overlooked Area in Your Business

Machine Identity Lies at the Core of Cybersecurity

In today’s world, attaining simplicity is the most difficult job. With each passing day, our lives are becoming more complex. Most of our experiences like shopping, working, reading, etc. are getting digitalized. Digital devices are becoming a part of … Continue reading Machine Identity Lies at the Core of Cybersecurity

Why is Machine Identity as important as Human Identity?

Communication is an elemental fabric of a society that keeps it running. There’s a constant exchange of information, commodities or services happening between individuals for various purposes. For any communication to occur, there are three entities in… Continue reading Why is Machine Identity as important as Human Identity?

Building Digital Trust with Machine Identity Management

While digital transformation has been underway for many years now, the outbreak of the COVID-19 pandemic made it an overnight business necessity. As organizations were forced to move their operations and workforces online, it became increasingly clear … Continue reading Building Digital Trust with Machine Identity Management

How a Single Digital Certificate Expiry Impacted 11 Countries?

It was early December 6th 2018, a cold winter morning when the security team at Swedish multinational networking and telecommunications company Ericsson received the jolt of their lives. A digital certificate used by Ericsson for its SGSN-MME (Serving … Continue reading How a Single Digital Certificate Expiry Impacted 11 Countries?

Establishing Zero Trust with Certificate Lifecycle Automation

Zero trust is a security strategy in which user access requests for data or resources on an organization’s network always need to be authenticated and authorized. The concept of zero trust became more of a necessity within the last few years due to the… Continue reading Establishing Zero Trust with Certificate Lifecycle Automation

Microsoft Exchange Admin Portal Goes Down Due to an Expired SSL Certificate

On May 23, 2021, a Sunday, Microsoft Exchange administrators woke up to warning messages on their browsers as they tried to access the Microsoft Exchange Admin Portal. The portal was rendered inaccessible with the message “Your connection is not privat… Continue reading Microsoft Exchange Admin Portal Goes Down Due to an Expired SSL Certificate

“Data Encryption,” “Zero Trust” – A Practical Review of Biden’s Executive Order on Improving the Nation’s Cybersecurity

In the aftermath of the cyberattack on Colonial Pipeline that crippled the nation’s supply of oil and gas for almost a week, U.S. President Joe Biden, on May 11, 2021, signed an Executive Order. The order issued a slew of cybersecurity directives to co… Continue reading “Data Encryption,” “Zero Trust” – A Practical Review of Biden’s Executive Order on Improving the Nation’s Cybersecurity

Cyberattack Cuts Off Critical U.S. Fuel Pipeline – Another Lesson in Cybersecurity Learned the Hard Way

On May 7, 2021, Colonial Pipeline, the U.S’s top fuel pipeline operator, came under a ransomware attack that forced it to shut down all fuel operations temporarily. Colonial operates the largest refined products pipeline in the U.S., transporting 100 m… Continue reading Cyberattack Cuts Off Critical U.S. Fuel Pipeline – Another Lesson in Cybersecurity Learned the Hard Way