Why ransomware is such a threat to critical infrastructure

A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be breached. Little more than a decade ago, what was considered critical infrastructu… Continue reading Why ransomware is such a threat to critical infrastructure

Managing digital certificates still a challenge, automation lagging

Managing digital certificates, especially expirations and renewals, continues to be a challenging process for businesses of all sizes, a study of over 300 IT professionals in the U.S. and the UK conducted by Opinium reveals. There is also a great deal … Continue reading Managing digital certificates still a challenge, automation lagging

Understanding Certificate Policies and Practice Statements

Public key infrastructure (PKI) is the sort of technology that most users take for granted. They use it every day in a variety of ways but most don’t even realize it. PKI manages the digital certificates that encrypt sensitive data, secures web browsi… Continue reading Understanding Certificate Policies and Practice Statements

With Remote Work, Don’t Leave Security Behind

We’ve all heard how the global pandemic has accelerated workplace trends that were already well underway. Adoption of automation, e-commerce, and remote work has increased significantly, and many of the changes are here to stay. For example, many orga… Continue reading With Remote Work, Don’t Leave Security Behind

Establishing Zero Trust with Certificate Lifecycle Automation

Zero trust is a security strategy in which user access requests for data or resources on an organization’s network always need to be authenticated and authorized. The concept of zero trust became more of a necessity within the last few years due to the… Continue reading Establishing Zero Trust with Certificate Lifecycle Automation

Keeping pace with evolving code signing baseline requirements

Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the importance of stopping malicious tampering and maximizing trust. The attack was espec… Continue reading Keeping pace with evolving code signing baseline requirements

Why combining FIDO2 and PKI provides broader enterprise-wide security

This past year’s seismic shift in how and where people access corporate resources has heightened the urgent need for organizations to upgrade the identity and authentication systems they rely on. That urgency isn’t likely to diminish anytime soon, according to a 2021 Gartner CIO survey. The survey found that 64% of employees at CIOs’ organizations are now able to work from home, and two-fifths are actually doing so, suggesting the landscape for authenticating users has clearly taken on new and more dynamic contours. But it’s not just people accessing enterprise resources. The transition to cloud-based services and the underlying automation supporting digital workloads have led to dramatic increases in the volume of non-human entities — virtual machines, mobile devices, applications, containers, and IoT/OT devices — all seeking their own access to enterprise resources independent of the end user’s identity. As a result, managing machine identities has also become part of […]

The post Why combining FIDO2 and PKI provides broader enterprise-wide security appeared first on CyberScoop.

Continue reading Why combining FIDO2 and PKI provides broader enterprise-wide security

Dispelling four myths about automating PKI certificate lifecycle management

The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the IoT, whether inside or outside the firewall. As the volume of machines, devices… Continue reading Dispelling four myths about automating PKI certificate lifecycle management

PKI market valuation to cross $7 billion by 2027

The market valuation of public key infrastructure will cross $7 billion by 2027, according to Global Market Insights. Rising digital interaction and reliance on digital authentications and regulatory compliance across enterprises are expected to boost … Continue reading PKI market valuation to cross $7 billion by 2027

Securing Remote Health Care Post-COVID-19

The global pandemic has accelerated technology trends across several industries, and health care is no exception. As social distancing increases, telehealth and remote patient monitoring are becoming increasingly common. According to the CDC, teleheal… Continue reading Securing Remote Health Care Post-COVID-19