Venafi TLS Protect for Kubernetes simplifies machine identity management

As part of the Venafi Control Plane for machine identities, TLS Protect for Kubernetes enables security and platform teams to easily and securely manage cloud native machine identities, such as TLS, mTLS and SPIFFE, across all of an enterprise’s multi-… Continue reading Venafi TLS Protect for Kubernetes simplifies machine identity management

ISARA makes four digital certificate patents publicly available to boost quantum security

ISARA revealed that it is dedicating the intellectual property behind its ISARA Catalyst Agile Digital Certificate Methodology — including four patents — to the public. Industry leaders, including Crypto4A, DigiCert, Entrust, ISARA, Keyfactor, PKI Solu… Continue reading ISARA makes four digital certificate patents publicly available to boost quantum security

cert-manager: Automatically provision and manage TLS certificates in Kubernetes

cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those certificates. It can issue certificates from a variety of supported sources, including Le… Continue reading cert-manager: Automatically provision and manage TLS certificates in Kubernetes

Venafi Control Plane for Machine Identities enables users to reduce security risk

Venafi unveiled the Venafi Control Plane for Machine Identities, unifying machine identity management across all identity types: in data centers, cloud, hybrid environments and at the edge. The Venafi Control Plane enables customers to accelerate digit… Continue reading Venafi Control Plane for Machine Identities enables users to reduce security risk

Use of machine identities is growing in state-sponsored cyberattacks

66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been either directly targeted or impacted by a nation-state cyber attack, according… Continue reading Use of machine identities is growing in state-sponsored cyberattacks

Organizations changing cyber strategy in response to nation-state attacks

66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been either directly targeted or impacted by a nation-state cyber attack, according… Continue reading Organizations changing cyber strategy in response to nation-state attacks

87% of the ransomware found on the dark web has been delivered via malicious macros

Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic Pathways between November 2021 and March 2022, the research analyzed 35 million… Continue reading 87% of the ransomware found on the dark web has been delivered via malicious macros

Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex, according to recent … Continue reading Now is the time to focus on software supply chain security improvements

Evaluating the use of encryption across the world’s top one million sites

A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million sites over the last six months and reveals the need for a control plane to automate the management of machine identitie… Continue reading Evaluating the use of encryption across the world’s top one million sites