ddos-attack

How DoS/DDoS Attacks Impact Machine Identity, Digital Certificates

|
How DoS/DDoS Attacks Impact Machine Identity, Digital Certificates brooke.crothers Tue, 11/22/2022 - 17:13 7 views For safe and secure utilization of machine identities such as SSL/TLS certificates, a careful check on the validity of such certificates is crucial. One of the ways this validity check is performed is using the ... Read More
what-is-a-private-key

What Is a Private Key?

|
What Is a Private Key? brooke.crothers Mon, 11/21/2022 - 18:30 4 views How Are Private Keys Used? Private key encryption is also referred to as symmetric encryption, where the same private key is used for both encryption and decryption. Private keys are also utilized in asymmetric cryptography, also known as ... Read More
encryption-key

What Is Encryption Key Management?

|
What Is Encryption Key Management? brooke.crothers Fri, 11/18/2022 - 18:19 3 views Why Is Key Management Important? Data is only good if it can be trusted. Imagine a criminal intercepting sensitive information as it travels through your API? To keep data safe, it is encrypted and decrypted using encryption keys ... Read More
china-cyber

China-Linked Cybercrime Group Attacks Asian Certificate Authority, Breaches Government Agencies

|
China-Linked Cybercrime Group Attacks Asian Certificate Authority, Breaches Government Agencies brooke.crothers Tue, 11/15/2022 - 15:14 8 views Billbug is longstanding threat All the targets of the attacks are in Asia but Symantec wasn’t more specific about the location or identities of the targets. Symantec calls the group responsible Billbug, an ... Read More
Certificate Management Discovery and Automation | TLS Protect Cloud Technical Demo, Venafi

TLS Machine Identity Inventory: How to Gain Full Visibility

|
TLS Machine Identity Inventory: How to Gain Full Visibility brooke.crothers Tue, 11/15/2022 - 09:08 17 views Visibility challenges With all these identities used across different types of machines, building and maintaining an accurate inventory is challenging, especially if you’re attempting to do so manually. Let’s look at a few examples ... Read More
ransomware-bitcoin-lock

Can Code Signing Macros Help Your Company Thwart Ransomware Attacks? [Case Study]

|
Can Code Signing Macros Help Your Company Thwart Ransomware Attacks? [Case Study] brooke.crothers Tue, 11/08/2022 - 16:20 11 views Macros are code: a 'smack' in the head The attack halted their logistics and brought down their customer service. This impact was amplified when the company decided to take down all ... Read More
ransomware-prevent

How to Prevent Ransomware Attacks

|
How to Prevent Ransomware Attacks brooke.crothers Wed, 11/02/2022 - 18:08 9 views Attacks doubled Ransomware attacks almost doubled during 2021 over 2020, according to Sophos State of Ransomware 2022 report, affecting 66% of businesses, up from 37%. This represents a 78% year-over-year increase, indicating that adversaries have become far more ... Read More
OpenSSL Update Patches High-Severity Vulnerabilities

OpenSSL Update Patches High-Severity Vulnerabilities

OpenSSL Update Patches High-Severity Vulnerabilities OpenSSL Update Patches High-Severity Vulnerabilities brooke.crothers Tue, 11/01/2022 - 11:44 8 views Malicious email address as trigger Both vulnerabilities allow for a stack overflow in the X.509 certificate verification process and can be triggered by a malicious email address in the certificate. The error is ... Read More
openssl-patch

OpenSSL Update Patches High-Severity Vulnerabilities

|
OpenSSL Update Patches High-Severity Vulnerabilities brooke.crothers Tue, 11/01/2022 - 11:44 8 views Malicious email address as trigger Both vulnerabilities allow for a stack overflow in the X.509 certificate verification process and can be triggered by a malicious email address in the certificate. The error is in the name constraint checking ... Read More
kubernetes-wheel

Increase Security for Private Workloads Using Isolated Issuers in Hardened Environments

|
Increase Security for Private Workloads Using Isolated Issuers in Hardened Environments brooke.crothers Thu, 10/27/2022 - 10:36 20 views The challenges for security policy using Kubernetes Secrets Kubernetes Secrets provides an acceptable level of security for most applications, but can be prone to leakage through human error, or maliciously intercepted via ... Read More