Scalability Critical in Manufacturing IoT Cybersecurity

Manufacturers that deploy IoT applications have invested considerably in cybersecurity to help protect their brands and meet compliance requirements. Analysts routinely include security in their top IT trends, and this year is no exception. However, i… Continue reading Scalability Critical in Manufacturing IoT Cybersecurity

Best Practices for AD CS Configuration

Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they must set up a public key infrastructure (PKI). PKIs deploy and manage certificates, which … Continue reading Best Practices for AD CS Configuration

How seriously are businesses taking their PKI security?

While most enterprises demonstrate a committed effort towards maintaining a well-rounded PKI setup, they still fall short in several key categories. The post-Black Hat survey report generated by AppViewX indicated that the primary reason for these shor… Continue reading How seriously are businesses taking their PKI security?

Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

We should be able to trust public key certificates, but this is the real world: mistakes and “mistakes” happen. Researchers from Indiana University Bloomington have analyzed 379 reported instances of failures in certificate issuance to pinp… Continue reading Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

Stopping Man-in-the-Middle Attacks With Cryptography

Man-in-the-middle. Man-in-the-browser. IP spoofing. DNS spoofing. They’re all part of the happy family of hacks generally known as Man-in-the-middle attacks, wherein a bad actor secretly relays and possibly alters the communication between two p… Continue reading Stopping Man-in-the-Middle Attacks With Cryptography

DigiCert Purchases QuoVadis, Becomes a Qualified TSP

Utah-based DigiCert acquired Swiss company QuoVadis in January, with the intention of delivering Qualified digital certificates and e-signature platforms certified for ETSI standards.  QuoVadis is a qualified trust service provider (TSP) in the EU, a … Continue reading DigiCert Purchases QuoVadis, Becomes a Qualified TSP

PKI Deployment: The Top 10 Definitive Answers

If there’s one thing I know, it’s public key infrastructure (PKI). PKI enables a trusted environment by authenticating, encrypting and ensuring the integrity of data and users. PKI is more important than ever, as organizations are doing a less-than-st… Continue reading PKI Deployment: The Top 10 Definitive Answers

How to Maintain PKI High Assurance in the Cloud, for the First Time

Cybersecurity adoption is booming, with record IT spending on security solutions for enterprises using on-premises as well as cloud and web-based services. Along with the proliferation of vendors and solutions is also a rise in security breaches. Disco… Continue reading How to Maintain PKI High Assurance in the Cloud, for the First Time

Risk Assessment and Identifying Vulnerabilities in Your PKI Management

Cyber security is a field both deep and broad with a large number of complicated facets. As no one can be an expert in all things, it can sometimes be difficult even for experienced security professionals to know where vulnerabilities are in the system… Continue reading Risk Assessment and Identifying Vulnerabilities in Your PKI Management